General
-
Target
413bd0bab52129e4bafc343c40b16f47771eb154ebb13d415211ac5067cef4b7
-
Size
351KB
-
Sample
220220-jympysbdej
-
MD5
efd0d3409e5e7ffe94f931ff6f09035e
-
SHA1
c7830b5cadb9320bc8b9876d84acb4e13f90434a
-
SHA256
413bd0bab52129e4bafc343c40b16f47771eb154ebb13d415211ac5067cef4b7
-
SHA512
a60fa47ed884327adf98c3ed3e67cf0149678f6c2cf74c3c6c627e579067ad4636afe122fd246fbf0613889af46a096d3656932a4bcad52a12803ff0950b9386
Static task
static1
Behavioral task
behavioral1
Sample
413bd0bab52129e4bafc343c40b16f47771eb154ebb13d415211ac5067cef4b7.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
413bd0bab52129e4bafc343c40b16f47771eb154ebb13d415211ac5067cef4b7.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
1CN2iQbBikFK9jM34Nb3WLx5DCenQLnbXp
Targets
-
-
Target
413bd0bab52129e4bafc343c40b16f47771eb154ebb13d415211ac5067cef4b7
-
Size
351KB
-
MD5
efd0d3409e5e7ffe94f931ff6f09035e
-
SHA1
c7830b5cadb9320bc8b9876d84acb4e13f90434a
-
SHA256
413bd0bab52129e4bafc343c40b16f47771eb154ebb13d415211ac5067cef4b7
-
SHA512
a60fa47ed884327adf98c3ed3e67cf0149678f6c2cf74c3c6c627e579067ad4636afe122fd246fbf0613889af46a096d3656932a4bcad52a12803ff0950b9386
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-