General
-
Target
320c98a9fd479c43fde9d3773a9eccd58e6cc63d1ba93343222c0b565460d689
-
Size
190KB
-
Sample
220506-scpf4acgak
-
MD5
ffef678beca8ee60200bc88809d89630
-
SHA1
b31070af1ac3e088dfc6f1599f8d12edb1b16783
-
SHA256
320c98a9fd479c43fde9d3773a9eccd58e6cc63d1ba93343222c0b565460d689
-
SHA512
54298098a866e24d99e3764154ae3ca4481e9163fd6e9e0d2c27d7978065a38da38accd58268c985b4ed0cfd4c11a27f4fa51e815c2d7a15e3ec18c453df89c3
Static task
static1
Behavioral task
behavioral1
Sample
320c98a9fd479c43fde9d3773a9eccd58e6cc63d1ba93343222c0b565460d689.exe
Resource
win10-20220414-en
Behavioral task
behavioral2
Sample
320c98a9fd479c43fde9d3773a9eccd58e6cc63d1ba93343222c0b565460d689.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Users\Admin\AppData\Local\Publishers\RyukReadMe.html
ryuk
Targets
-
-
Target
320c98a9fd479c43fde9d3773a9eccd58e6cc63d1ba93343222c0b565460d689
-
Size
190KB
-
MD5
ffef678beca8ee60200bc88809d89630
-
SHA1
b31070af1ac3e088dfc6f1599f8d12edb1b16783
-
SHA256
320c98a9fd479c43fde9d3773a9eccd58e6cc63d1ba93343222c0b565460d689
-
SHA512
54298098a866e24d99e3764154ae3ca4481e9163fd6e9e0d2c27d7978065a38da38accd58268c985b4ed0cfd4c11a27f4fa51e815c2d7a15e3ec18c453df89c3
Score10/10-
Drops file in Drivers directory
-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Modifies file permissions
-
Adds Run key to start application
-
Drops file in System32 directory
-