General
-
Target
aced9fc0fe2737e1b1354b27462b7013126a573bf13b7b73fcb9b35a637831b5
-
Size
808KB
-
Sample
220306-hmxkcacaaj
-
MD5
50cc057a164640715e70a43979175a3f
-
SHA1
690d83a764b7f4b65232e25c410c02cc5901ad72
-
SHA256
aced9fc0fe2737e1b1354b27462b7013126a573bf13b7b73fcb9b35a637831b5
-
SHA512
ea527edb150fd8e582e13597053a0e84604f45265181aa410608161a6e0e8aa0988e9c84735cdda01cdf6bab362a60ef490c233e1c947a15ee7b61cd48d60aa2
Static task
static1
Behavioral task
behavioral1
Sample
aced9fc0fe2737e1b1354b27462b7013126a573bf13b7b73fcb9b35a637831b5.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
aced9fc0fe2737e1b1354b27462b7013126a573bf13b7b73fcb9b35a637831b5.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Targets
-
-
Target
aced9fc0fe2737e1b1354b27462b7013126a573bf13b7b73fcb9b35a637831b5
-
Size
808KB
-
MD5
50cc057a164640715e70a43979175a3f
-
SHA1
690d83a764b7f4b65232e25c410c02cc5901ad72
-
SHA256
aced9fc0fe2737e1b1354b27462b7013126a573bf13b7b73fcb9b35a637831b5
-
SHA512
ea527edb150fd8e582e13597053a0e84604f45265181aa410608161a6e0e8aa0988e9c84735cdda01cdf6bab362a60ef490c233e1c947a15ee7b61cd48d60aa2
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-