General
-
Target
2024-02-01_4b856a1955455820d78ff42a58a77cd8_ryuk
-
Size
212KB
-
Sample
240201-q1h8wagfal
-
MD5
4b856a1955455820d78ff42a58a77cd8
-
SHA1
738ac3a6503620634fe841aac9a3bdff44efe8db
-
SHA256
2d90f3ce2c9cb5e3cb5365e5f618e96c80a08133839ff6b29fc4808fe70ddf41
-
SHA512
d017e766a3ca6f4ef71f137c3b8acd9e4b764ab47c3b5436113c08f1df0e33604b4f2954555edbcd1f3c38d64795a007a627656178c5827661773c45b162ab6f
-
SSDEEP
3072:skoemwJEECCvcVbQQFrUoR19V6To0Hqs3WvSp:ZEECCElQk3wqFu
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-01_4b856a1955455820d78ff42a58a77cd8_ryuk.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-01_4b856a1955455820d78ff42a58a77cd8_ryuk.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
Targets
-
-
Target
2024-02-01_4b856a1955455820d78ff42a58a77cd8_ryuk
-
Size
212KB
-
MD5
4b856a1955455820d78ff42a58a77cd8
-
SHA1
738ac3a6503620634fe841aac9a3bdff44efe8db
-
SHA256
2d90f3ce2c9cb5e3cb5365e5f618e96c80a08133839ff6b29fc4808fe70ddf41
-
SHA512
d017e766a3ca6f4ef71f137c3b8acd9e4b764ab47c3b5436113c08f1df0e33604b4f2954555edbcd1f3c38d64795a007a627656178c5827661773c45b162ab6f
-
SSDEEP
3072:skoemwJEECCvcVbQQFrUoR19V6To0Hqs3WvSp:ZEECCElQk3wqFu
Score10/10-
Detects command variations typically used by ransomware
-
Drops desktop.ini file(s)
-