General
-
Target
23e7c1b52d6ea8adec233eaff38c6a00153de3b99f51b02fe6a297ee5210f9c8
-
Size
170KB
-
Sample
220220-k9ts3sahc3
-
MD5
c4a5c4a20aa92002fd73ffa1eae12875
-
SHA1
de32df32c920015197ed7304d67ac3475876502b
-
SHA256
23e7c1b52d6ea8adec233eaff38c6a00153de3b99f51b02fe6a297ee5210f9c8
-
SHA512
0c8b7702f0f8cfb715f4c7d2c254d3224c7f4f2aacc6cef30f774be8d3210b2defacbabf812d936d590ec720ab7c19c69ae8844f5a55993d0e31d3041fdf9e0b
Static task
static1
Behavioral task
behavioral1
Sample
23e7c1b52d6ea8adec233eaff38c6a00153de3b99f51b02fe6a297ee5210f9c8.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
23e7c1b52d6ea8adec233eaff38c6a00153de3b99f51b02fe6a297ee5210f9c8.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Targets
-
-
Target
23e7c1b52d6ea8adec233eaff38c6a00153de3b99f51b02fe6a297ee5210f9c8
-
Size
170KB
-
MD5
c4a5c4a20aa92002fd73ffa1eae12875
-
SHA1
de32df32c920015197ed7304d67ac3475876502b
-
SHA256
23e7c1b52d6ea8adec233eaff38c6a00153de3b99f51b02fe6a297ee5210f9c8
-
SHA512
0c8b7702f0f8cfb715f4c7d2c254d3224c7f4f2aacc6cef30f774be8d3210b2defacbabf812d936d590ec720ab7c19c69ae8844f5a55993d0e31d3041fdf9e0b
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-