General

  • Target

    5f8b44362df4db2b3552b7afd2ab1a720f7afeb60a9a798132061e83faf1411d

  • Size

    188KB

  • Sample

    220220-hhgy4aagdl

  • MD5

    24d05101e5fc0a61d6aaf9b801c0ba39

  • SHA1

    0004b680e9798329923128dfe731f0d2c181e7b6

  • SHA256

    5f8b44362df4db2b3552b7afd2ab1a720f7afeb60a9a798132061e83faf1411d

  • SHA512

    52bf57c082891c872418cace41a5a43ed7adf856c6ac8f56a9e762cb603e67f0396c6537ad22d835d8b6a3c086a934d6b773a0c3dfc14ba050f7008bc483c765

Score
10/10

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html

Family

ryuk

Ransom Note
<html><body><p style="font-weight:bold;font-size:125%;top:0;left:0;"> osazni@protonmail.com <br> dilicheback1973@protonmail.com </p><p style="position:absolute;bottom:0;right:1%;font-weight:bold;font-size:170%">balance of shadow universe</p><div style="font-size: 550%;font-weight:bold;width:50%;height:50%;overflow:auto;margin:auto;position:absolute;top:35%;left:40%;">Ryuk</div></body></html�������������������������������������������������������������������������������������������������������������������������������������������������������
Emails

osazni@protonmail.com

dilicheback1973@protonmail.com

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html

Family

ryuk

Ransom Note
osazni@protonmail.com dilicheback1973@protonmail.com balance of shadow universe Ryuk
Emails

osazni@protonmail.com

dilicheback1973@protonmail.com

Targets

    • Target

      5f8b44362df4db2b3552b7afd2ab1a720f7afeb60a9a798132061e83faf1411d

    • Size

      188KB

    • MD5

      24d05101e5fc0a61d6aaf9b801c0ba39

    • SHA1

      0004b680e9798329923128dfe731f0d2c181e7b6

    • SHA256

      5f8b44362df4db2b3552b7afd2ab1a720f7afeb60a9a798132061e83faf1411d

    • SHA512

      52bf57c082891c872418cace41a5a43ed7adf856c6ac8f56a9e762cb603e67f0396c6537ad22d835d8b6a3c086a934d6b773a0c3dfc14ba050f7008bc483c765

    Score
    10/10
    • Ryuk

      Ransomware distributed via existing botnets, often Trickbot or Emotet.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks