d:\fpgarite\clientstores\i460rc\src\OUTPUT\nt_64\release\bin\mbin\digilentjtag.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-28_6e4fda83661c8582fb9c8c53a6e389bf_ryuk.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-28_6e4fda83661c8582fb9c8c53a6e389bf_ryuk.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-28_6e4fda83661c8582fb9c8c53a6e389bf_ryuk
-
Size
227KB
-
MD5
6e4fda83661c8582fb9c8c53a6e389bf
-
SHA1
6f089f08c6da48aeb3ee24d924b9b707da0add5b
-
SHA256
9963d0fd467b2f14882453f59f5698a22e12a4af38be7f577f4b09267724eafb
-
SHA512
70af6c6e92bffa18df4632bb32f6d5bee22d2bf6541ae8e015050b43602b563ed7cfd88472e52ea267f998060fa6329dfe64e167c5c8f516e86d78cef89140a3
-
SSDEEP
6144:5BpDTZKdH/B0oxh8uFRziavvJofWwuxsDbX:XsB0U8HL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-28_6e4fda83661c8582fb9c8c53a6e389bf_ryuk
Files
-
2024-01-28_6e4fda83661c8582fb9c8c53a6e389bf_ryuk.exe windows:6 windows x64 arch:x64
1fb48ac9c52a28281f995641728ea569
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
dmgr
DmgrGetInfo
DmgrFreeDvcEnum
DmgrGetDvc
DmgrEnumDevices
DmgrClose
DmgrOpen
DmgrSzFromErc
DmgrGetLastError
djtg
DjtgPutTmsTdiBits
DjtgPutTmsBits
DjtgSetSpeed
DjtgDisable
DjtgEnable
kernel32
HeapSize
FlushFileBuffers
GetStringTypeW
GetProcessHeap
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
CloseHandle
GetLastError
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
CreateEventA
Sleep
ResumeThread
GetTickCount
WaitForMultipleObjects
FindNextFileA
FindFirstFileExA
FindClose
GetTimeZoneInformation
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
ReadConsoleW
ReadFile
SetEndOfFile
WriteConsoleW
SetStdHandle
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlPcToFileHeader
EncodePointer
RaiseException
RtlUnwindEx
HeapReAlloc
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
SetFilePointerEx
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
CreateFileW
GetFileType
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
CreateThread
ExitThread
FreeLibraryAndExitThread
SetConsoleCtrlHandler
GetModuleFileNameA
GetStdHandle
GetCommandLineA
GetCommandLineW
GetACP
HeapFree
HeapAlloc
ws2_32
freeaddrinfo
getaddrinfo
WSACancelBlockingCall
WSAGetLastError
WSACleanup
WSAStartup
gethostname
socket
setsockopt
send
select
recv
listen
ioctlsocket
closesocket
bind
accept
__WSAFDIsSet
Sections
.text Size: 156KB - Virtual size: 155KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 240B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 720B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ