General
-
Target
30d986f622f5f1f7dbab689ab17293ede8e37edbb1a8709658b2a4320683c122
-
Size
208KB
-
Sample
220220-knvhgsbgbr
-
MD5
c596f71c6048997c88e80b57f045b891
-
SHA1
ed2b5d11f20648a49a11be1795be5632c412879d
-
SHA256
30d986f622f5f1f7dbab689ab17293ede8e37edbb1a8709658b2a4320683c122
-
SHA512
e18effe825ca1355bafcaf1da41bdf0485bab3af2898d963c059b922f03c2128756da679667b6480234bb3daed4b2e2a366241782f9f4b404ca7897683cc11eb
Static task
static1
Behavioral task
behavioral1
Sample
30d986f622f5f1f7dbab689ab17293ede8e37edbb1a8709658b2a4320683c122.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
30d986f622f5f1f7dbab689ab17293ede8e37edbb1a8709658b2a4320683c122.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
Targets
-
-
Target
30d986f622f5f1f7dbab689ab17293ede8e37edbb1a8709658b2a4320683c122
-
Size
208KB
-
MD5
c596f71c6048997c88e80b57f045b891
-
SHA1
ed2b5d11f20648a49a11be1795be5632c412879d
-
SHA256
30d986f622f5f1f7dbab689ab17293ede8e37edbb1a8709658b2a4320683c122
-
SHA512
e18effe825ca1355bafcaf1da41bdf0485bab3af2898d963c059b922f03c2128756da679667b6480234bb3daed4b2e2a366241782f9f4b404ca7897683cc11eb
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops desktop.ini file(s)
-