General
-
Target
379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99
-
Size
117KB
-
Sample
220220-kdsadaaed8
-
MD5
045eb328ff30b09cebd6fe3c031db7bc
-
SHA1
b28cd818c54d7a4f5416728a8f8408e6c9c40bc2
-
SHA256
379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99
-
SHA512
6f612366761abc5017dfdb6db985736f059fc21c8b6ab6816d379357cca7f9f1ff14690ddb71179e9771e58e0a5eb85d2765b58e8057666b497a7420658ae8e9
Static task
static1
Behavioral task
behavioral1
Sample
379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\users\Public\RyukReadMe.html
ryuk
Targets
-
-
Target
379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99
-
Size
117KB
-
MD5
045eb328ff30b09cebd6fe3c031db7bc
-
SHA1
b28cd818c54d7a4f5416728a8f8408e6c9c40bc2
-
SHA256
379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99
-
SHA512
6f612366761abc5017dfdb6db985736f059fc21c8b6ab6816d379357cca7f9f1ff14690ddb71179e9771e58e0a5eb85d2765b58e8057666b497a7420658ae8e9
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Modifies file permissions
-