General
-
Target
9f8bea9fe7c238d34e4c1e1e47e4d57631b813ab7bfea50db52b229110c6a61a
-
Size
444KB
-
Sample
220305-sprrzsgeh4
-
MD5
1fe2b06f573c1809a79c14da0f26f605
-
SHA1
dc137d2c45d47d62449860f76f57dd85d34d122e
-
SHA256
9f8bea9fe7c238d34e4c1e1e47e4d57631b813ab7bfea50db52b229110c6a61a
-
SHA512
10070abdc4320702b3a76b229a41dc2118ec5bc42af488c5db7d3381f43f38b40f47a7b624ac623c0f8da76e5bb6f7922668ae2af6a1af8c464b82836b6c7ca1
Static task
static1
Behavioral task
behavioral1
Sample
9f8bea9fe7c238d34e4c1e1e47e4d57631b813ab7bfea50db52b229110c6a61a.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
9f8bea9fe7c238d34e4c1e1e47e4d57631b813ab7bfea50db52b229110c6a61a.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Users\Admin\AppData\Local\RyukReadMe.html
ryuk
Targets
-
-
Target
9f8bea9fe7c238d34e4c1e1e47e4d57631b813ab7bfea50db52b229110c6a61a
-
Size
444KB
-
MD5
1fe2b06f573c1809a79c14da0f26f605
-
SHA1
dc137d2c45d47d62449860f76f57dd85d34d122e
-
SHA256
9f8bea9fe7c238d34e4c1e1e47e4d57631b813ab7bfea50db52b229110c6a61a
-
SHA512
10070abdc4320702b3a76b229a41dc2118ec5bc42af488c5db7d3381f43f38b40f47a7b624ac623c0f8da76e5bb6f7922668ae2af6a1af8c464b82836b6c7ca1
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Modifies file permissions
-
Suspicious use of SetThreadContext
-