General
-
Target
2024-02-01_35b13a59b337817d0dd970851a787ebe_ryuk
-
Size
212KB
-
Sample
240201-q1alqsgehn
-
MD5
35b13a59b337817d0dd970851a787ebe
-
SHA1
2c76b02c2c1b84bad236a89b7a2021694901ac8d
-
SHA256
146a9cad779f2ded42d1254c7c722742fb25d3871babe0dc76555ee28b65a6f8
-
SHA512
0c4c542a96e177284bec34295cf03122df88847c750d036bc577b62b75c0b4d58756b21500a01018855dd307c57a6238bb866345a3bab1be9dc76b6403fedce2
-
SSDEEP
3072:skoemwJEECCvcVbQQFrUoR19V6To0Hqs3WvS1:ZEECCElQk3wqF+
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-01_35b13a59b337817d0dd970851a787ebe_ryuk.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-01_35b13a59b337817d0dd970851a787ebe_ryuk.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
C:\Users\RyukReadMe.txt
ryuk
Targets
-
-
Target
2024-02-01_35b13a59b337817d0dd970851a787ebe_ryuk
-
Size
212KB
-
MD5
35b13a59b337817d0dd970851a787ebe
-
SHA1
2c76b02c2c1b84bad236a89b7a2021694901ac8d
-
SHA256
146a9cad779f2ded42d1254c7c722742fb25d3871babe0dc76555ee28b65a6f8
-
SHA512
0c4c542a96e177284bec34295cf03122df88847c750d036bc577b62b75c0b4d58756b21500a01018855dd307c57a6238bb866345a3bab1be9dc76b6403fedce2
-
SSDEEP
3072:skoemwJEECCvcVbQQFrUoR19V6To0Hqs3WvS1:ZEECCElQk3wqF+
Score10/10-
Detects command variations typically used by ransomware
-
Drops desktop.ini file(s)
-