General
-
Target
379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99
-
Size
117KB
-
Sample
220506-sc15wscgam
-
MD5
045eb328ff30b09cebd6fe3c031db7bc
-
SHA1
b28cd818c54d7a4f5416728a8f8408e6c9c40bc2
-
SHA256
379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99
-
SHA512
6f612366761abc5017dfdb6db985736f059fc21c8b6ab6816d379357cca7f9f1ff14690ddb71179e9771e58e0a5eb85d2765b58e8057666b497a7420658ae8e9
Static task
static1
Behavioral task
behavioral1
Sample
379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe
Resource
win10-20220414-en
Behavioral task
behavioral2
Sample
379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\users\Public\RyukReadMe.html
ryuk
Targets
-
-
Target
379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99
-
Size
117KB
-
MD5
045eb328ff30b09cebd6fe3c031db7bc
-
SHA1
b28cd818c54d7a4f5416728a8f8408e6c9c40bc2
-
SHA256
379ff8def54e51a12c15d10479906d7e643c88cae9b829eeb7e1ea1e171b3a99
-
SHA512
6f612366761abc5017dfdb6db985736f059fc21c8b6ab6816d379357cca7f9f1ff14690ddb71179e9771e58e0a5eb85d2765b58e8057666b497a7420658ae8e9
Score10/10-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Modifies file permissions
-
Drops desktop.ini file(s)
-