General
-
Target
18faf22d7b96bfdb5fd806d4fe6fd9124b665b571d89cb53975bc3e23dd75ff1
-
Size
200KB
-
Sample
220220-ltke5sbbc6
-
MD5
c8325c660ea72a8eb5281898f7a87f34
-
SHA1
dd318ffdd4b1081733dccf95cddb4e000814e005
-
SHA256
18faf22d7b96bfdb5fd806d4fe6fd9124b665b571d89cb53975bc3e23dd75ff1
-
SHA512
835ae5c5740c8a17973cb0e4265bd93925f59abdacdeb17b9d9eb53a3776c48ed7cfc0f5c044f9adf61be4d86f40059c6bca755faf3e9716bd46dc9dab6f328c
Static task
static1
Behavioral task
behavioral1
Sample
18faf22d7b96bfdb5fd806d4fe6fd9124b665b571d89cb53975bc3e23dd75ff1.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
18faf22d7b96bfdb5fd806d4fe6fd9124b665b571d89cb53975bc3e23dd75ff1.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Documents and Settings\Admin\RyukReadMe.html
ryuk
Targets
-
-
Target
18faf22d7b96bfdb5fd806d4fe6fd9124b665b571d89cb53975bc3e23dd75ff1
-
Size
200KB
-
MD5
c8325c660ea72a8eb5281898f7a87f34
-
SHA1
dd318ffdd4b1081733dccf95cddb4e000814e005
-
SHA256
18faf22d7b96bfdb5fd806d4fe6fd9124b665b571d89cb53975bc3e23dd75ff1
-
SHA512
835ae5c5740c8a17973cb0e4265bd93925f59abdacdeb17b9d9eb53a3776c48ed7cfc0f5c044f9adf61be4d86f40059c6bca755faf3e9716bd46dc9dab6f328c
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-