General
-
Target
2024-01-11_754b79913fde2de487e9fc2826b65d57_ryuk_trickbot
-
Size
666KB
-
Sample
240112-gqs6nahadk
-
MD5
754b79913fde2de487e9fc2826b65d57
-
SHA1
c8299aadf886da55cb47e5cbafe8c5a482b47fc8
-
SHA256
0816d66320d221de576c8a9e6af1b05c7656832939876dd99bb8b40029fe694a
-
SHA512
4a2420e2e89757cab2376932ce548f9b31b845f8c99dfd1cdd9a3b53dabed9e3cb11ecf514edeaccd932f277f65397c126ecaf42831f016554d2001034a25a1d
-
SSDEEP
12288:b9x+Tm3J3SrhP6pRKBdxZXi0gjFBFq4wTdbU0Cp4RWeAK+1coRm:b9nJ3SrhC+BdxZXi0gjFLq4wTZU0Cp4N
Behavioral task
behavioral1
Sample
2024-01-11_754b79913fde2de487e9fc2826b65d57_ryuk_trickbot.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-11_754b79913fde2de487e9fc2826b65d57_ryuk_trickbot.exe
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
2024-01-11_754b79913fde2de487e9fc2826b65d57_ryuk_trickbot
-
Size
666KB
-
MD5
754b79913fde2de487e9fc2826b65d57
-
SHA1
c8299aadf886da55cb47e5cbafe8c5a482b47fc8
-
SHA256
0816d66320d221de576c8a9e6af1b05c7656832939876dd99bb8b40029fe694a
-
SHA512
4a2420e2e89757cab2376932ce548f9b31b845f8c99dfd1cdd9a3b53dabed9e3cb11ecf514edeaccd932f277f65397c126ecaf42831f016554d2001034a25a1d
-
SSDEEP
12288:b9x+Tm3J3SrhP6pRKBdxZXi0gjFBFq4wTdbU0Cp4RWeAK+1coRm:b9nJ3SrhC+BdxZXi0gjFLq4wTZU0Cp4N
-
Detected AnchorDNS Backdoor
Sample triggered yara rules associated with the AnchorDNS malware family.
-
Executes dropped EXE
-
Loads dropped DLL
-