General
-
Target
4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539
-
Size
188KB
-
Sample
220220-jgx5csabe2
-
MD5
d2d3d877e06b0181b67c6e610b40c44c
-
SHA1
6a0dd2ab04d5b0b6869d5b7d9b4eb591087bace9
-
SHA256
4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539
-
SHA512
320cc4f1862425d706c4d369fa5f13a62cc9f3454dae91b239a28440c14dd92972b8d1cfa4fea699dc996e67c3a4db49b4c4ed6e63329492ee6cf8f4f7059cf0
Static task
static1
Behavioral task
behavioral1
Sample
4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Targets
-
-
Target
4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539
-
Size
188KB
-
MD5
d2d3d877e06b0181b67c6e610b40c44c
-
SHA1
6a0dd2ab04d5b0b6869d5b7d9b4eb591087bace9
-
SHA256
4b5b08346e369b59cae2120fcdc16b720bf2f2ec74115045cfafc24eecccb539
-
SHA512
320cc4f1862425d706c4d369fa5f13a62cc9f3454dae91b239a28440c14dd92972b8d1cfa4fea699dc996e67c3a4db49b4c4ed6e63329492ee6cf8f4f7059cf0
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-