General
-
Target
8c983fc99712412b33c356e0fbba3e58ca1ca0501537ea11c81cba0198442abe
-
Size
885KB
-
Sample
221110-g3yxnsfde9
-
MD5
a57e1e6fe1c98d2e75799a46e9eb5797
-
SHA1
7878e7042c355546c118a38b90d8f7221f74d8a4
-
SHA256
8c983fc99712412b33c356e0fbba3e58ca1ca0501537ea11c81cba0198442abe
-
SHA512
5764f3b1971f64c9d55f387524d92038350dbdf9a7195dc7e3f7b83760d93f45e73dd4c4af6cc597add838acd2d4a4e5b7a96a3444e3c8b0369b1d487621909d
-
SSDEEP
12288:zD7Z7cwy8U9JlpYqWYgeWYg955/155/0QebUlAAsDsKKAosRn6X:z57ctflKgQKUKRDsKKAjN6
Static task
static1
Behavioral task
behavioral1
Sample
8c983fc99712412b33c356e0fbba3e58ca1ca0501537ea11c81cba0198442abe.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8c983fc99712412b33c356e0fbba3e58ca1ca0501537ea11c81cba0198442abe.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
C:\ProgramData\RyukReadMe.txt
Targets
-
-
Target
8c983fc99712412b33c356e0fbba3e58ca1ca0501537ea11c81cba0198442abe
-
Size
885KB
-
MD5
a57e1e6fe1c98d2e75799a46e9eb5797
-
SHA1
7878e7042c355546c118a38b90d8f7221f74d8a4
-
SHA256
8c983fc99712412b33c356e0fbba3e58ca1ca0501537ea11c81cba0198442abe
-
SHA512
5764f3b1971f64c9d55f387524d92038350dbdf9a7195dc7e3f7b83760d93f45e73dd4c4af6cc597add838acd2d4a4e5b7a96a3444e3c8b0369b1d487621909d
-
SSDEEP
12288:zD7Z7cwy8U9JlpYqWYgeWYg955/155/0QebUlAAsDsKKAosRn6X:z57ctflKgQKUKRDsKKAjN6
Score10/10-
Clears Windows event logs
-
Modifies boot configuration data using bcdedit
-
Disables Task Manager via registry modification
-
Disables taskbar notifications via registry modification
-
Disables use of System Restore points
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-