General
-
Target
58a0a5646669443e997f88d532219141ff6c9ca8d36cd449c34a1807be919a9d
-
Size
153KB
-
Sample
220220-hv5kxsahfq
-
MD5
91759691cfe41dd1a9dd07eaf9f48129
-
SHA1
37fd2b22f3a9c85cdbaaf4cbbe33333ecc8030c4
-
SHA256
58a0a5646669443e997f88d532219141ff6c9ca8d36cd449c34a1807be919a9d
-
SHA512
f19d0b358f318e243a648311b1cf7e9c162cf18880f667ba4daff3fd5696a17854a091791452ee9814b1e1e85d07f4b98da07d957b7f51b450692e85a6b5e3a6
Static task
static1
Behavioral task
behavioral1
Sample
58a0a5646669443e997f88d532219141ff6c9ca8d36cd449c34a1807be919a9d.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
58a0a5646669443e997f88d532219141ff6c9ca8d36cd449c34a1807be919a9d.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
Targets
-
-
Target
58a0a5646669443e997f88d532219141ff6c9ca8d36cd449c34a1807be919a9d
-
Size
153KB
-
MD5
91759691cfe41dd1a9dd07eaf9f48129
-
SHA1
37fd2b22f3a9c85cdbaaf4cbbe33333ecc8030c4
-
SHA256
58a0a5646669443e997f88d532219141ff6c9ca8d36cd449c34a1807be919a9d
-
SHA512
f19d0b358f318e243a648311b1cf7e9c162cf18880f667ba4daff3fd5696a17854a091791452ee9814b1e1e85d07f4b98da07d957b7f51b450692e85a6b5e3a6
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Drops desktop.ini file(s)
-