General
-
Target
NEAS.2023-09-08_27da99119d8e3861ce4ae256eaebc77c_ryuk_JC.exe
-
Size
21.5MB
-
Sample
231023-zg7lssfc31
-
MD5
27da99119d8e3861ce4ae256eaebc77c
-
SHA1
2e0af5f2e0ab966a223d4859fc74b72704163688
-
SHA256
e23c765efdf5a2dad367a83efeeebc6ac53bdc4bbdc6c42cc2d9083379451b99
-
SHA512
e8835a23ff94ea55d03a8dd64603e5c6c825a059b1902df7ad606f06228af284e51c5c5faccf88a52f806c4e19d6c6740755f88b8a4bd4441d1f374dc59f2c06
-
SSDEEP
98304:9E2RpMMHMMMvMMZMMMlmMMMiMMMYJMMHMMM6MMZMMMqNMMzMMMUMMVMMMYJMMzMm:9nwngnwnBRp
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.2023-09-08_27da99119d8e3861ce4ae256eaebc77c_ryuk_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.2023-09-08_27da99119d8e3861ce4ae256eaebc77c_ryuk_JC.exe
Resource
win10v2004-20231023-en
Malware Config
Targets
-
-
Target
NEAS.2023-09-08_27da99119d8e3861ce4ae256eaebc77c_ryuk_JC.exe
-
Size
21.5MB
-
MD5
27da99119d8e3861ce4ae256eaebc77c
-
SHA1
2e0af5f2e0ab966a223d4859fc74b72704163688
-
SHA256
e23c765efdf5a2dad367a83efeeebc6ac53bdc4bbdc6c42cc2d9083379451b99
-
SHA512
e8835a23ff94ea55d03a8dd64603e5c6c825a059b1902df7ad606f06228af284e51c5c5faccf88a52f806c4e19d6c6740755f88b8a4bd4441d1f374dc59f2c06
-
SSDEEP
98304:9E2RpMMHMMMvMMZMMMlmMMMiMMMYJMMHMMM6MMZMMMqNMMzMMMUMMVMMMYJMMzMm:9nwngnwnBRp
Score10/10-
Modifies WinLogon for persistence
-
Renames multiple (265) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (93) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-