General
-
Target
11a6f8c683b66a650f39b56daeaf4c826a8661805d5556bed5f2ee2de46e3ef0
-
Size
122KB
-
Sample
220305-zxyc3aahgk
-
MD5
bd0d931b21e4d8f85cea56b3e17b5f49
-
SHA1
e0c604bcf4dc48f5929d382f7af84b157ceb87db
-
SHA256
11a6f8c683b66a650f39b56daeaf4c826a8661805d5556bed5f2ee2de46e3ef0
-
SHA512
a6d6f736e4b86e3544ede2b0a285639a20295de75b26b606add66504d7e238ae2439e6d9549bc0cd13cd8ff6917a481fb275761991444d70497a27c10f368d29
Static task
static1
Behavioral task
behavioral1
Sample
11a6f8c683b66a650f39b56daeaf4c826a8661805d5556bed5f2ee2de46e3ef0.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
11a6f8c683b66a650f39b56daeaf4c826a8661805d5556bed5f2ee2de46e3ef0.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
C:\MSOCache\All Users\RyukReadMe.html
ryuk
Targets
-
-
Target
11a6f8c683b66a650f39b56daeaf4c826a8661805d5556bed5f2ee2de46e3ef0
-
Size
122KB
-
MD5
bd0d931b21e4d8f85cea56b3e17b5f49
-
SHA1
e0c604bcf4dc48f5929d382f7af84b157ceb87db
-
SHA256
11a6f8c683b66a650f39b56daeaf4c826a8661805d5556bed5f2ee2de46e3ef0
-
SHA512
a6d6f736e4b86e3544ede2b0a285639a20295de75b26b606add66504d7e238ae2439e6d9549bc0cd13cd8ff6917a481fb275761991444d70497a27c10f368d29
Score10/10-
Modifies file permissions
-
Drops desktop.ini file(s)
-