General
-
Target
56cc8b989ac43641950fecc73f42f76bdc441bee531ecf3e8c71bf9b4a563177
-
Size
202KB
-
Sample
220220-h1hcksbabp
-
MD5
ab390eb9f4302cb3ecfbf63027e177ca
-
SHA1
1b84a4c57c6e54a13db6cd49b7e1673b97d02d0f
-
SHA256
56cc8b989ac43641950fecc73f42f76bdc441bee531ecf3e8c71bf9b4a563177
-
SHA512
ce7152a2a844a7e2fc7134e5125823ebdcc355191f73d687af282b8f3b3f123a68990e51402d35d6ac6ebf44ac8abe54303cb381b946868316415b8caa1e2d77
Static task
static1
Behavioral task
behavioral1
Sample
56cc8b989ac43641950fecc73f42f76bdc441bee531ecf3e8c71bf9b4a563177.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
56cc8b989ac43641950fecc73f42f76bdc441bee531ecf3e8c71bf9b4a563177.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
Targets
-
-
Target
56cc8b989ac43641950fecc73f42f76bdc441bee531ecf3e8c71bf9b4a563177
-
Size
202KB
-
MD5
ab390eb9f4302cb3ecfbf63027e177ca
-
SHA1
1b84a4c57c6e54a13db6cd49b7e1673b97d02d0f
-
SHA256
56cc8b989ac43641950fecc73f42f76bdc441bee531ecf3e8c71bf9b4a563177
-
SHA512
ce7152a2a844a7e2fc7134e5125823ebdcc355191f73d687af282b8f3b3f123a68990e51402d35d6ac6ebf44ac8abe54303cb381b946868316415b8caa1e2d77
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops desktop.ini file(s)
-