General
-
Target
3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8
-
Size
200KB
-
Sample
220220-khrjmsbfem
-
MD5
7d6d8c3caadbd235247c750ce3280e0f
-
SHA1
223b210cdbeb47ff015180150730c6a0057fa000
-
SHA256
3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8
-
SHA512
dfc3f55204755be47a5d7273dfa66d1dfc1bfc7e97ccfd48aca5a7e4c8c5eea2b85a6cfb17ba990fa69259be46e3d7c6134e2b47cfe2be0f42227cd3df349e8c
Static task
static1
Behavioral task
behavioral1
Sample
3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Documents and Settings\Admin\AppData\Local\Adobe\RyukReadMe.html
ryuk
Targets
-
-
Target
3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8
-
Size
200KB
-
MD5
7d6d8c3caadbd235247c750ce3280e0f
-
SHA1
223b210cdbeb47ff015180150730c6a0057fa000
-
SHA256
3500d96ea12fc67e55177d0c4db81e0cbd86b6d7974e741ff1a49116a6b4f8c8
-
SHA512
dfc3f55204755be47a5d7273dfa66d1dfc1bfc7e97ccfd48aca5a7e4c8c5eea2b85a6cfb17ba990fa69259be46e3d7c6134e2b47cfe2be0f42227cd3df349e8c
Score10/10-
Drops desktop.ini file(s)
-