General
-
Target
d2e194259106bca3b42dc8690d340b59.bin
-
Size
335KB
-
Sample
230311-b8r4esgb43
-
MD5
dd26f40520194b6fc55eedac38461763
-
SHA1
ad4fe1d10fdac8c1b67172fdd65e79a08fa4d21f
-
SHA256
e895436da58025d7c077ab276708ee996125c811eb8d45f24e14d3facd9db10b
-
SHA512
9d4d9d69883393d664fe793f472dafb08bc105ccd0357aa7cbd0b2c53104f433cffb4124344a82b1383af26cd842732f5fbed2bfbcb7437d46c46f31d26ef5d2
-
SSDEEP
6144:9avNkLjUUg3BAXZsdy+RWTohDY8x83SNU9sA4C1Y8ZTahZzfPCl2:AVk/UUgxIZlshDY8x8CO9DTY8ZuhdT
Static task
static1
Behavioral task
behavioral1
Sample
788ad5c53b3fc95ff2ae004d0449b76fede8bafad608e0603caca7cd044c8fbc.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
788ad5c53b3fc95ff2ae004d0449b76fede8bafad608e0603caca7cd044c8fbc.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
C:\ProgramData\RyukReadMe.txt
Targets
-
-
Target
788ad5c53b3fc95ff2ae004d0449b76fede8bafad608e0603caca7cd044c8fbc.exe
-
Size
767KB
-
MD5
d2e194259106bca3b42dc8690d340b59
-
SHA1
edcd63a3125854ed72cb5811f08644a87e265e3b
-
SHA256
788ad5c53b3fc95ff2ae004d0449b76fede8bafad608e0603caca7cd044c8fbc
-
SHA512
4cecf1db68cd71b92b2e968719a365397b3ccd16340a952a8901647e9829b0a6e8d4cb1f948fb792f2cc58e4f6e289fd81cb104b43ddc8469c0671935e653a13
-
SSDEEP
12288:RnBkozA9lzIeVJ+OeO+OeNhBBhhBBUA9CGkIDIP6J9kgnDC3TbqUttRrvCsZ+nt2:jkozAjK95DIP4DCDbq8tRrvB
Score10/10-
Clears Windows event logs
-
Disables Task Manager via registry modification
-
Disables taskbar notifications via registry modification
-
Disables use of System Restore points
-
Drops startup file
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-