General

  • Target

    6a5bf25ff4f72ebca91280ffda057260.bin

  • Size

    388KB

  • Sample

    230311-bxcjlahh2z

  • MD5

    ee031dc9c42dd5030fe50582c79a00be

  • SHA1

    3a5984c2bdb7fc04314634e1922801f7ab6a7bf2

  • SHA256

    69e0e73ae659477a01cbc4a7e9720a85daa1e690718449a9f8927b76d755cf93

  • SHA512

    e1b3dc2afd69d6a6abf98329200d0d61b7999f19232334d54256ac093cb10831bfb3757cfa49b9b24f428ee968ba587cd543c43daaa2d1ba5500ae44d343c5fb

  • SSDEEP

    12288:+lvX6pHbuwpmk/mAMnfzMzQiqWj6E45dQc:+BX6pHbuwEk8s6E45ic

Malware Config

Extracted

Path

C:\ProgramData\RyukReadMe.txt

Ransom Note
Your network has been penetrated. All files on each host in the network have been encrypted with a strong algorithm. Backups were either encrypted Shadow copies also removed, so F8 or any other methods may damage encrypted data but not recover. We exclusively have decryption software for your situation. More than a year ago, world experts recognized the impossibility of deciphering by any means except the original decoder. No decryption software is available in the public. Antiviruse companies, researchers, IT specialists, and no other persons cant help you decrypt the data. DO NOT RESET OR SHUTDOWN - files may be damaged. DO NOT DELETE readme files. To confirm our honest intentions.Send 2 different random files and you will get it decrypted. It can be from different computers on your network to be sure that one key decrypts everything. 2 files we unlock for free To get info (decrypt your files) contact us at Vulcanteam@CYBERFEAR.COM or vulcanteam@inboxhub.net You will receive btc address for payment in the reply letter Ryuk No system is safe
Emails

Vulcanteam@CYBERFEAR.COM

vulcanteam@inboxhub.net

Targets

    • Target

      0d25bbbeb68847cab4f3805bb8028ca901aa569abb038660c5febfe2ba24ec09.exe

    • Size

      885KB

    • MD5

      6a5bf25ff4f72ebca91280ffda057260

    • SHA1

      722063331acdbfc93ccbfacbec045800a835dd9e

    • SHA256

      0d25bbbeb68847cab4f3805bb8028ca901aa569abb038660c5febfe2ba24ec09

    • SHA512

      64d6f8fe84882bb5b835388461e2f662d58b8b69ca6314869e4e4bd29496f4ae2d2bda5afa82cbfc6a29d563368343da1b19431fc24ec5261618a424543bce42

    • SSDEEP

      12288:Qm+PiUwyM02Jl5YqWYgeWYg955/155/0QebUlAAsrsKCQoZRn6X:Q5iUtklagQKUKRrsKCQON6

    • Ryuk

      Ransomware distributed via existing botnets, often Trickbot or Emotet.

    • Clears Windows event logs

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Modifies boot configuration data using bcdedit

    • Deletes backup catalog

      Uses wbadmin.exe to inhibit system recovery.

    • Disables Task Manager via registry modification

    • Disables taskbar notifications via registry modification

    • Disables use of System Restore points

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Hidden Files and Directories

1
T1158

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Indicator Removal on Host

1
T1070

File Deletion

3
T1107

File Permissions Modification

1
T1222

Hidden Files and Directories

1
T1158

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Impact

Inhibit System Recovery

5
T1490

Tasks