General
-
Target
ryuk.exe
-
Size
885KB
-
Sample
220921-ze6ayshae5
-
MD5
35194c73ff38dd6c3bed7c0efcff6826
-
SHA1
1a1ebd30f4a3498cc09824b6fdfdf1b8d9ae9db1
-
SHA256
5fce1d810a5e1c7536496c1b73eff77c9c3d92ac41f86959a1be5349663403ae
-
SHA512
cf2ed61ffdfad8067aff8776e0dab1f27ea2551f7497108a6cca7eb0105a5f96ea1453dde29f488433cc645e55104d7397ee4f35db51526993823ef46763f28f
-
SSDEEP
12288:CXrZ7kwy8U9JlpYqWYgeWYg955/155/0QebUlAAs7sKSAoSRn6X:C97ktflKgQKUKR7sKSAhN6
Static task
static1
Behavioral task
behavioral1
Sample
ryuk.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ryuk.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\ProgramData\RyukReadMe.txt
Recoverfile@aol.com
Recoverfile1@aol.com
Targets
-
-
Target
ryuk.exe
-
Size
885KB
-
MD5
35194c73ff38dd6c3bed7c0efcff6826
-
SHA1
1a1ebd30f4a3498cc09824b6fdfdf1b8d9ae9db1
-
SHA256
5fce1d810a5e1c7536496c1b73eff77c9c3d92ac41f86959a1be5349663403ae
-
SHA512
cf2ed61ffdfad8067aff8776e0dab1f27ea2551f7497108a6cca7eb0105a5f96ea1453dde29f488433cc645e55104d7397ee4f35db51526993823ef46763f28f
-
SSDEEP
12288:CXrZ7kwy8U9JlpYqWYgeWYg955/155/0QebUlAAs7sKSAoSRn6X:C97ktflKgQKUKR7sKSAhN6
Score10/10-
Clears Windows event logs
-
Modifies boot configuration data using bcdedit
-
Disables Task Manager via registry modification
-
Disables taskbar notifications via registry modification
-
Disables use of System Restore points
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Indicator Removal on Host
1File Deletion
3Hidden Files and Directories
1File Permissions Modification
1Discovery
Query Registry
3System Information Discovery
4Peripheral Device Discovery
1Execution
Command-Line Interface
1Exfiltration
Initial Access
Lateral Movement
Persistence
Scheduled Task
1Privilege Escalation