General

  • Target

    2023-08-25_56b1521a30e3e542e2804089563e0b47_ryuk_JC.exe

  • Size

    7.8MB

  • Sample

    231014-a7b55sac23

  • MD5

    56b1521a30e3e542e2804089563e0b47

  • SHA1

    89d877438ceda60a5f290817747ab46916aaa371

  • SHA256

    2ab4c5b0787649404ea4fb77259fe16a9b1b3d45ff1ee59a6857ce1af2f983be

  • SHA512

    723f34fea35fffee9c7e6d027b499a1884b45e021e4d0798c68d190f1485fb73be18f0512f1c443bbed570d4eb26db834bb22eb0255ac6890f83376127b1c2a9

  • SSDEEP

    98304:9E2RpMMHMMMvMMZMMMlmMMMiMMMYJMMHMMM6MMZMMMqNMMzMMMUMMVMMMYJMMzMg:9nwnL

Score
10/10

Malware Config

Targets

    • Target

      2023-08-25_56b1521a30e3e542e2804089563e0b47_ryuk_JC.exe

    • Size

      7.8MB

    • MD5

      56b1521a30e3e542e2804089563e0b47

    • SHA1

      89d877438ceda60a5f290817747ab46916aaa371

    • SHA256

      2ab4c5b0787649404ea4fb77259fe16a9b1b3d45ff1ee59a6857ce1af2f983be

    • SHA512

      723f34fea35fffee9c7e6d027b499a1884b45e021e4d0798c68d190f1485fb73be18f0512f1c443bbed570d4eb26db834bb22eb0255ac6890f83376127b1c2a9

    • SSDEEP

      98304:9E2RpMMHMMMvMMZMMMlmMMMiMMMYJMMHMMM6MMZMMMqNMMzMMMUMMVMMMYJMMzMg:9nwnL

    Score
    10/10
    • Modifies WinLogon for persistence

    • Renames multiple (91) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks