General

  • Target

    NEAS.2023-09-05_68f6c36ff1f16e3f932fdc3ee852c368_ryuk_JC.exe

  • Size

    18.8MB

  • Sample

    231031-1lrxksgc77

  • MD5

    68f6c36ff1f16e3f932fdc3ee852c368

  • SHA1

    cd8e5b8f7e5ce0f344b0b1635a4c37759dce9b2e

  • SHA256

    3c62d8b15088bbe9837e9bf4c2133911205663499bbd23b7a64bdc1fd58985be

  • SHA512

    971c8a0fc5f105ddc7ff14b0cecac4238a3f18621e0180a82be0116263ce23a27f1b2029a43e4df255872836efbd6374524b609bd1b354ebb053b90b3cdca68e

  • SSDEEP

    98304:9E2RpMMHMMMvMMZMMMlmMMMiMMMYJMMHMMM6MMZMMMqNMMzMMMUMMVMMMYJMMzMW:9nwngnwnX

Score
10/10

Malware Config

Targets

    • Target

      NEAS.2023-09-05_68f6c36ff1f16e3f932fdc3ee852c368_ryuk_JC.exe

    • Size

      18.8MB

    • MD5

      68f6c36ff1f16e3f932fdc3ee852c368

    • SHA1

      cd8e5b8f7e5ce0f344b0b1635a4c37759dce9b2e

    • SHA256

      3c62d8b15088bbe9837e9bf4c2133911205663499bbd23b7a64bdc1fd58985be

    • SHA512

      971c8a0fc5f105ddc7ff14b0cecac4238a3f18621e0180a82be0116263ce23a27f1b2029a43e4df255872836efbd6374524b609bd1b354ebb053b90b3cdca68e

    • SSDEEP

      98304:9E2RpMMHMMMvMMZMMMlmMMMiMMMYJMMHMMM6MMZMMMqNMMzMMMUMMVMMMYJMMzMW:9nwngnwnX

    Score
    10/10
    • Modifies WinLogon for persistence

    • Renames multiple (91) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks