General

  • Target

    18faf22d7b96bfdb5fd806d4fe6fd9124b665b571d89cb53975bc3e23dd75ff1

  • Size

    200KB

  • Sample

    220220-ltke5sbbc6

  • MD5

    c8325c660ea72a8eb5281898f7a87f34

  • SHA1

    dd318ffdd4b1081733dccf95cddb4e000814e005

  • SHA256

    18faf22d7b96bfdb5fd806d4fe6fd9124b665b571d89cb53975bc3e23dd75ff1

  • SHA512

    835ae5c5740c8a17973cb0e4265bd93925f59abdacdeb17b9d9eb53a3776c48ed7cfc0f5c044f9adf61be4d86f40059c6bca755faf3e9716bd46dc9dab6f328c

Score
10/10

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html

Family

ryuk

Ransom Note
<html><body><p style="font-weight:bold;font-size:125%;top:0;left:0;"> bizthipoda1973@protonmail.com <br> smitapcacons1977@protonmail.com </p><p style="position:absolute;bottom:0;right:1%;font-weight:bold;font-size:170%">balance of shadow universe</p><div style="font-size: 550%;font-weight:bold;width:50%;height:50%;overflow:auto;margin:auto;position:absolute;top:35%;left:40%;">Ryuk</div></body></html�������������������������������������������������������������������������������������������������������������������������������������������������������
Emails

bizthipoda1973@protonmail.com

smitapcacons1977@protonmail.com

Extracted

Path

C:\Documents and Settings\Admin\RyukReadMe.html

Family

ryuk

Ransom Note
bizthipoda1973@protonmail.com smitapcacons1977@protonmail.com balance of shadow universe Ryuk
Emails

bizthipoda1973@protonmail.com

smitapcacons1977@protonmail.com

Targets

    • Target

      18faf22d7b96bfdb5fd806d4fe6fd9124b665b571d89cb53975bc3e23dd75ff1

    • Size

      200KB

    • MD5

      c8325c660ea72a8eb5281898f7a87f34

    • SHA1

      dd318ffdd4b1081733dccf95cddb4e000814e005

    • SHA256

      18faf22d7b96bfdb5fd806d4fe6fd9124b665b571d89cb53975bc3e23dd75ff1

    • SHA512

      835ae5c5740c8a17973cb0e4265bd93925f59abdacdeb17b9d9eb53a3776c48ed7cfc0f5c044f9adf61be4d86f40059c6bca755faf3e9716bd46dc9dab6f328c

    Score
    10/10
    • Ryuk

      Ransomware distributed via existing botnets, often Trickbot or Emotet.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks