General
-
Target
db4de2955b598cecad9db79578569f99e13736b952a1c4a5ee31bd395814da30
-
Size
3.0MB
-
Sample
220510-xkc59aadar
-
MD5
e80284f5842d668c222765fc56540b7b
-
SHA1
30d3bafbd5919524895c6c274f758a8ca2a38a2d
-
SHA256
db4de2955b598cecad9db79578569f99e13736b952a1c4a5ee31bd395814da30
-
SHA512
0b138ba88c1540f1fd5889c7b96f5eb624d128ba0b40dd55a817d5b16b7ae5d1dfa0bdb907a81989efe516201f708536fc5f50da875c0b00046465774dd0a2d9
Static task
static1
Behavioral task
behavioral1
Sample
db4de2955b598cecad9db79578569f99e13736b952a1c4a5ee31bd395814da30.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
db4de2955b598cecad9db79578569f99e13736b952a1c4a5ee31bd395814da30.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\nsf8F47F.tmp\eula_part.6.txt
ryuk
Targets
-
-
Target
db4de2955b598cecad9db79578569f99e13736b952a1c4a5ee31bd395814da30
-
Size
3.0MB
-
MD5
e80284f5842d668c222765fc56540b7b
-
SHA1
30d3bafbd5919524895c6c274f758a8ca2a38a2d
-
SHA256
db4de2955b598cecad9db79578569f99e13736b952a1c4a5ee31bd395814da30
-
SHA512
0b138ba88c1540f1fd5889c7b96f5eb624d128ba0b40dd55a817d5b16b7ae5d1dfa0bdb907a81989efe516201f708536fc5f50da875c0b00046465774dd0a2d9
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-