General
-
Target
ffbf608aaef69e1ee53f8303c685604dd584985f809d19f6cbc914fa86b3ae66
-
Size
118KB
-
Sample
220506-sdctpacgan
-
MD5
a31089dc3cafe77c39268273d689193b
-
SHA1
032e0b9a0bf012401507be974ee6bdb3e6726fd7
-
SHA256
ffbf608aaef69e1ee53f8303c685604dd584985f809d19f6cbc914fa86b3ae66
-
SHA512
d92748b34286c21f4781b147000be1b54cf57e14587517638647b8369ccd01b3ecb00545be0d87d44f9dde6b30a404db2740bf06275dea647efc33eafd65d2f4
Static task
static1
Behavioral task
behavioral1
Sample
ffbf608aaef69e1ee53f8303c685604dd584985f809d19f6cbc914fa86b3ae66.exe
Resource
win10-20220414-en
Behavioral task
behavioral2
Sample
ffbf608aaef69e1ee53f8303c685604dd584985f809d19f6cbc914fa86b3ae66.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\users\Public\RyukReadMe.html
ryuk
http://zq6gyokyso6dgsxitjuk2tkq2rl4saq4tkz2idcf6z3tfondtvemshad.onion
Targets
-
-
Target
ffbf608aaef69e1ee53f8303c685604dd584985f809d19f6cbc914fa86b3ae66
-
Size
118KB
-
MD5
a31089dc3cafe77c39268273d689193b
-
SHA1
032e0b9a0bf012401507be974ee6bdb3e6726fd7
-
SHA256
ffbf608aaef69e1ee53f8303c685604dd584985f809d19f6cbc914fa86b3ae66
-
SHA512
d92748b34286c21f4781b147000be1b54cf57e14587517638647b8369ccd01b3ecb00545be0d87d44f9dde6b30a404db2740bf06275dea647efc33eafd65d2f4
Score10/10-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Modifies file permissions
-
Drops desktop.ini file(s)
-