ssh-agent.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-29_b7f3648e9db28ac542e153dab0c0116b_ryuk.exe
Resource
win7-20231215-en
General
-
Target
2024-01-29_b7f3648e9db28ac542e153dab0c0116b_ryuk
-
Size
950KB
-
MD5
b7f3648e9db28ac542e153dab0c0116b
-
SHA1
10a92fe03c56b8d00a92e3288532c428aa44af22
-
SHA256
487a217540675ea5fa0226cbd6d149720a13eb15eda476a18c1c4c329d1016ae
-
SHA512
8303d31b485818523a82d47114ee50d46c843f62fd7cd3f04d2234d71351a839cbcb0bb9aa8ee7ea7d3bc9e814aaa5bb5b66364c3412003b2c51aca76e38e7f8
-
SSDEEP
12288:R1MKv6gcgZwdRXc3ajG+hjQKymY8efKCpD7Gj9G6G1qT8nQkCu83L3Wl/np9DBDR:RmG+pdRsqjnhMgeiCl7G0nehbGZpbD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-01-29_b7f3648e9db28ac542e153dab0c0116b_ryuk
Files
-
2024-01-29_b7f3648e9db28ac542e153dab0c0116b_ryuk.exe windows:6 windows x64 arch:x64
b0565cdccadf19e165e5c9e4185ebe4f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
libcrypto
EVP_sha384
EVP_md5
DSA_SIG_free
EVP_sha256
DSA_SIG_new
EVP_Digest
EVP_sha1
EVP_sha512
EVP_CIPHER_CTX_key_length
DSA_do_verify
DSA_do_sign
EVP_CIPHER_CTX_new
EVP_aes_256_cbc
ECDSA_SIG_new
ECDSA_do_verify
ECDSA_SIG_free
ECDSA_do_sign
EVP_CipherInit
EVP_des_ede3_cbc
EVP_aes_192_cbc
EVP_CIPHER_CTX_set_app_data
EVP_CIPHER_CTX_get_app_data
AES_set_encrypt_key
AES_encrypt
EVP_CIPHER_CTX_ctrl
EVP_CIPHER_CTX_set_key_length
RAND_bytes
EVP_aes_256_gcm
EVP_aes_128_gcm
EVP_CIPHER_CTX_free
EC_POINT_oct2point
BN_bn2bin
EC_POINT_point2oct
BN_bin2bn
RSA_public_decrypt
RSA_sign
BN_div
RSA_size
BN_CTX_new
BN_CTX_free
RSA_blinding_on
BN_dup
EC_GROUP_get_order
DSA_free
BN_clear_free
EC_KEY_set_private_key
BN_value_one
EC_METHOD_get_field_type
EC_POINT_mul
RSA_new
RSA_free
ERR_get_error
EC_POINT_get_affine_coordinates_GFp
EC_KEY_set_public_key
BN_free
EC_POINT_is_at_infinity
EC_POINT_free
EVP_aes_128_cbc
EC_KEY_free
EC_KEY_get0_public_key
DSA_new
EC_POINT_new
BN_new
EC_KEY_get0_private_key
EC_KEY_get0_group
BN_cmp
BN_sub
EC_GROUP_method_of
EC_KEY_new_by_curve_name
EVP_Cipher
BN_num_bits
kernel32
SetCurrentDirectoryW
SetEnvironmentVariableW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
SetLastError
RtlUnwindEx
GetModuleHandleW
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
QueryPerformanceCounter
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetCurrentDirectoryW
LoadLibraryExW
ReadConsoleOutputA
SetConsoleCursorPosition
GetConsoleWindow
Beep
FillConsoleOutputAttribute
WriteConsoleOutputA
SetConsoleCursorInfo
SetConsoleWindowInfo
GetConsoleCP
GetConsoleCursorInfo
ScrollConsoleScreenBufferA
SetConsoleScreenBufferSize
SetConsoleTextAttribute
FillConsoleOutputCharacterA
GetCommandLineA
WriteConsoleW
SetConsoleCtrlHandler
GetModuleFileNameW
GetLastError
ExitProcess
GetModuleHandleExW
FindClose
FindFirstFileExW
SetHandleInformation
FindNextFileW
CreateNamedPipeW
WaitForMultipleObjects
CreateThread
GetNamedPipeClientProcessId
ExitThread
GetQueuedCompletionStatus
FreeLibraryAndExitThread
OpenProcess
HeapFree
HeapAlloc
SetEvent
CloseHandle
GetCurrentProcessId
CreateProcessW
CreateEventA
CreateIoCompletionPort
ConnectNamedPipe
ReadFile
WriteFile
GetOverlappedResult
CompareStringW
LCMapStringW
LocalFree
GetStringTypeW
GetCommandLineW
SetStdHandle
GetConsoleMode
GetCurrentProcess
GetStdHandle
TerminateProcess
ReadConsoleW
CreateWaitableTimerA
SetEndOfFile
GetCurrentThreadId
SetFilePointerEx
GetFileType
WaitForSingleObjectEx
WaitForMultipleObjectsEx
OpenThread
FlushFileBuffers
HeapReAlloc
GetConsoleScreenBufferInfo
GetFileSizeEx
IsValidCodePage
WaitForSingleObject
CreateFileW
GetACP
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
GetProcAddress
FreeLibrary
WideCharToMultiByte
GetSystemTimeAsFileTime
GetExitCodeProcess
FreeEnvironmentStringsW
WriteFileEx
CreateFileA
SleepEx
GetProcessHeap
HeapSize
RaiseException
GetLocalTime
QueueUserAPC
MultiByteToWideChar
advapi32
StartServiceCtrlDispatcherW
EventWrite
EventRegister
RegDeleteTreeA
RevertToSelf
RegCloseKey
RegOpenCurrentUser
RegCreateKeyExA
RegDeleteKeyExA
RegEnumKeyExW
ImpersonateLoggedOnUser
RegDeleteTreeW
RegOpenKeyExA
RegOpenKeyExW
RegQueryValueExW
CreateWellKnownSid
RegCreateKeyExW
IsWellKnownSid
RegSetValueExW
OpenProcessToken
CheckTokenMembership
DuplicateToken
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetTokenInformation
OpenSCManagerW
SetServiceStatus
RegisterServiceCtrlHandlerW
StartServiceA
OpenServiceW
crypt32
CryptProtectData
CryptUnprotectData
CryptStringToBinaryA
ws2_32
WSAStartup
WSAGetLastError
WSASend
user32
GetWindowPlacement
ShowWindow
Sections
.text Size: 191KB - Virtual size: 191KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 171KB - Virtual size: 170KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 568KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE