General
-
Target
46fb27f4cff2d33baae3b1c199797d1f0929bc03166cebd092081e4fe2f9ea6e
-
Size
152KB
-
Sample
220220-jm6npabcdl
-
MD5
bc041eb3eeb75312288557c23e919caa
-
SHA1
258c5fc6145aaeca748ae9fb85ca1d9dfba93fc6
-
SHA256
46fb27f4cff2d33baae3b1c199797d1f0929bc03166cebd092081e4fe2f9ea6e
-
SHA512
461a0c07559c66157c9f285fed06dfe4888438ce29eebfa4b7ed89fb53cd70e3a4e4fc05f3816344cd3bda3040762069724b1f51189955a5dbf1a714427842b6
Static task
static1
Behavioral task
behavioral1
Sample
46fb27f4cff2d33baae3b1c199797d1f0929bc03166cebd092081e4fe2f9ea6e.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
46fb27f4cff2d33baae3b1c199797d1f0929bc03166cebd092081e4fe2f9ea6e.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
1L9fYHJJxeLMD2yyhh1cMFU2EWF5ihgAmJ
Targets
-
-
Target
46fb27f4cff2d33baae3b1c199797d1f0929bc03166cebd092081e4fe2f9ea6e
-
Size
152KB
-
MD5
bc041eb3eeb75312288557c23e919caa
-
SHA1
258c5fc6145aaeca748ae9fb85ca1d9dfba93fc6
-
SHA256
46fb27f4cff2d33baae3b1c199797d1f0929bc03166cebd092081e4fe2f9ea6e
-
SHA512
461a0c07559c66157c9f285fed06dfe4888438ce29eebfa4b7ed89fb53cd70e3a4e4fc05f3816344cd3bda3040762069724b1f51189955a5dbf1a714427842b6
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-