General
-
Target
a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510
-
Size
171KB
-
Sample
220306-e4js2abgam
-
MD5
567407d941d99abeff20a1b836570d30
-
SHA1
e8866fda01f91c6d4bf8c51cf4cbc7f103e87b0b
-
SHA256
a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510
-
SHA512
514cc28f8da0e8bf054bf0a0963c4253a16df1d5cb8e87dd09294ab97d8e1b5b5fc18c54920a3829d40b0bdda5837567a73b39b4d1839ab919d672ceaf32989b
Static task
static1
Behavioral task
behavioral1
Sample
a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
15FC73BdkpDMUWmxo7e7gtLRtM8gQgXyb4
Targets
-
-
Target
a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510
-
Size
171KB
-
MD5
567407d941d99abeff20a1b836570d30
-
SHA1
e8866fda01f91c6d4bf8c51cf4cbc7f103e87b0b
-
SHA256
a0dccbe010859116063fc3f7e00c8c7bd68b849eeb7238a10b1b9f07f5c36510
-
SHA512
514cc28f8da0e8bf054bf0a0963c4253a16df1d5cb8e87dd09294ab97d8e1b5b5fc18c54920a3829d40b0bdda5837567a73b39b4d1839ab919d672ceaf32989b
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-