General
-
Target
bf575ce1c9425bc44f5cabbc34366e0e92ef369db0a8b69942c5bdb1cca9b800
-
Size
138KB
-
Sample
221220-mrdegscd9y
-
MD5
f62bb82db62dd6b80908dcd79ea51fb2
-
SHA1
e635ba1b935adf31ffd055d71884098567b3dd4f
-
SHA256
bf575ce1c9425bc44f5cabbc34366e0e92ef369db0a8b69942c5bdb1cca9b800
-
SHA512
869863239f231d3bea636a98f7adb8d6f04f60fb2cacc5ef8d8d87bfaf327abc57668e0cc1e8f10adcb7156646ff75ff67fb3f06f22b25797220eccd91b93e08
-
SSDEEP
3072:dsFd0klDWOsja1mrT0CowNJ8s540uUf0WccH2hgcD:QWHrYNwNeQEBgc
Static task
static1
Behavioral task
behavioral1
Sample
bf575ce1c9425bc44f5cabbc34366e0e92ef369db0a8b69942c5bdb1cca9b800.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bf575ce1c9425bc44f5cabbc34366e0e92ef369db0a8b69942c5bdb1cca9b800.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\Profiles\RyukReadMe.html
ryuk
Targets
-
-
Target
bf575ce1c9425bc44f5cabbc34366e0e92ef369db0a8b69942c5bdb1cca9b800
-
Size
138KB
-
MD5
f62bb82db62dd6b80908dcd79ea51fb2
-
SHA1
e635ba1b935adf31ffd055d71884098567b3dd4f
-
SHA256
bf575ce1c9425bc44f5cabbc34366e0e92ef369db0a8b69942c5bdb1cca9b800
-
SHA512
869863239f231d3bea636a98f7adb8d6f04f60fb2cacc5ef8d8d87bfaf327abc57668e0cc1e8f10adcb7156646ff75ff67fb3f06f22b25797220eccd91b93e08
-
SSDEEP
3072:dsFd0klDWOsja1mrT0CowNJ8s540uUf0WccH2hgcD:QWHrYNwNeQEBgc
Score10/10-
Modifies boot configuration data using bcdedit
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-