General

  • Target

    eb0106ddaa84ba85fdaba5df923df7ecdc612a90e1268e031923266fa17eef4c

  • Size

    198KB

  • Sample

    220725-cpb4jaagbk

  • MD5

    721204e947131cf3c04e506c4ec9dbf2

  • SHA1

    e2e53a822b0731abfd9f8c503e70d62573f7aced

  • SHA256

    eb0106ddaa84ba85fdaba5df923df7ecdc612a90e1268e031923266fa17eef4c

  • SHA512

    5305069b9ba53fdb89487ac4b6f062bbd10f83300e8fd4562a18f140bc11055e960013550055b4e58148339596cc8d849b709e3c0b0ddc830e85d8f3d2405405

Score
10/10

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html

Family

ryuk

Ransom Note
<html><body><p style="font-weight:bold;font-size:125%;top:0;left:0;"> nepigeni1987@protonmail.com <br> spirfulmice1981@protonmail.com </p><p style="position:absolute;bottom:0;right:1%;font-weight:bold;font-size:170%">balance of shadow universe</p><div style="font-size: 550%;font-weight:bold;width:50%;height:50%;overflow:auto;margin:auto;position:absolute;top:35%;left:40%;">Ryuk</div></body></html�������������������������������������������������������������������������������������������������������������������������������������������������������
Emails

nepigeni1987@protonmail.com

spirfulmice1981@protonmail.com

Extracted

Path

C:\RyukReadMe.html

Family

ryuk

Ransom Note
nepigeni1987@protonmail.com spirfulmice1981@protonmail.com balance of shadow universe Ryuk
Emails

nepigeni1987@protonmail.com

spirfulmice1981@protonmail.com

Targets

    • Target

      eb0106ddaa84ba85fdaba5df923df7ecdc612a90e1268e031923266fa17eef4c

    • Size

      198KB

    • MD5

      721204e947131cf3c04e506c4ec9dbf2

    • SHA1

      e2e53a822b0731abfd9f8c503e70d62573f7aced

    • SHA256

      eb0106ddaa84ba85fdaba5df923df7ecdc612a90e1268e031923266fa17eef4c

    • SHA512

      5305069b9ba53fdb89487ac4b6f062bbd10f83300e8fd4562a18f140bc11055e960013550055b4e58148339596cc8d849b709e3c0b0ddc830e85d8f3d2405405

    Score
    10/10
    • Ryuk

      Ransomware distributed via existing botnets, often Trickbot or Emotet.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks