General

  • Target

    2024-02-13_785441d795ee886e64a262cb4128fa88_ryuk

  • Size

    206KB

  • Sample

    240213-xajkaafc8x

  • MD5

    785441d795ee886e64a262cb4128fa88

  • SHA1

    7f44a811f375b0f1345fc899d87830dcb4c7b910

  • SHA256

    763f87c330f656f6ad258a660d920a4e633e79e2591a3def855d9444d24cbc8b

  • SHA512

    e5b2f6ee99519962c1f5f3bd98fffef2ae6b94d9b18e616746cc787b0e4092254af989680053732aae2c50e291db86146e25cbf56644afe8da8b23f5750691bb

  • SSDEEP

    1536:QQNiHikoUR86gSEB47j9kY61YZVDbeLtoepdEgIbsW9d7B9dl23PQx0scIC:Rkot6FEBwrfVDmtoepG19VA3o6scIC

Score
10/10

Malware Config

Extracted

Path

C:\RyukReadMe.txt

Family

ryuk

Ransom Note
Your network has been penetrated. All files on each network host have been encrypted with a strong algorithm. Backups were encrypted too. Shadow copies also removed, so F8 or any other methods may damage encrypted data but not recover. Only we have exclusive decryption software, suitable for your situation. More than a year ago, world experts recognized the impossibility of such encryption deciphering by any means except the original decoder. No decryption software is available in the public. Antivirus companies, researchers, IT specialists, and any other persons cannot help you to decipher the data. Decryption takes from ten minutes up to several hours. It is performed automatically and doesn't require from you any actions except decoder launching. DO NOT RESET OR SHUTDOWN SYSTEM � files may be damaged. DO NOT DELETE readme files. To confirm our honest intentions. Send 2 different random files and you will get them back decrypted. It can be from different computers on your network to be sure that one key decrypts everything. We will unlock 2 files for free. To get info (decrypt your files) contact us a FusilloLailyn95@protonmail.com or amoreeTapaoan94@protonmail.com You will receive btc address for payment in the reply letter Ryuk No system is safe
Emails

FusilloLailyn95@protonmail.com

amoreeTapaoan94@protonmail.com

Targets

    • Target

      2024-02-13_785441d795ee886e64a262cb4128fa88_ryuk

    • Size

      206KB

    • MD5

      785441d795ee886e64a262cb4128fa88

    • SHA1

      7f44a811f375b0f1345fc899d87830dcb4c7b910

    • SHA256

      763f87c330f656f6ad258a660d920a4e633e79e2591a3def855d9444d24cbc8b

    • SHA512

      e5b2f6ee99519962c1f5f3bd98fffef2ae6b94d9b18e616746cc787b0e4092254af989680053732aae2c50e291db86146e25cbf56644afe8da8b23f5750691bb

    • SSDEEP

      1536:QQNiHikoUR86gSEB47j9kY61YZVDbeLtoepdEgIbsW9d7B9dl23PQx0scIC:Rkot6FEBwrfVDmtoepG19VA3o6scIC

    Score
    10/10
    • Ryuk

      Ransomware distributed via existing botnets, often Trickbot or Emotet.

    • Detects command variations typically used by ransomware

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops desktop.ini file(s)

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks