General
-
Target
2024-02-17_fba034cb2ee768fb4ff42cb71464980b_ryuk
-
Size
170KB
-
Sample
240217-ry3eeagd57
-
MD5
fba034cb2ee768fb4ff42cb71464980b
-
SHA1
7d7746b8c124621994c4d1a448234c005fa860df
-
SHA256
a032bc2be51f6a445d671a04d5fd081efb4514105f97545b3222d39666aa787e
-
SHA512
d6b8556191e009e1d279e11a90296eafee0609238867b7a2ffdb180a448e0d81e447c0c03498f35a067da03a97a5c07337e1c333a57e116f64b4b1d8d1e1c694
-
SSDEEP
3072:2HeriftL/WSo1vDb53j/8WGUzaqVh4LI8zQpnA:2+rA/WSo1rl3ALrlHQpnA
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-17_fba034cb2ee768fb4ff42cb71464980b_ryuk.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-17_fba034cb2ee768fb4ff42cb71464980b_ryuk.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Targets
-
-
Target
2024-02-17_fba034cb2ee768fb4ff42cb71464980b_ryuk
-
Size
170KB
-
MD5
fba034cb2ee768fb4ff42cb71464980b
-
SHA1
7d7746b8c124621994c4d1a448234c005fa860df
-
SHA256
a032bc2be51f6a445d671a04d5fd081efb4514105f97545b3222d39666aa787e
-
SHA512
d6b8556191e009e1d279e11a90296eafee0609238867b7a2ffdb180a448e0d81e447c0c03498f35a067da03a97a5c07337e1c333a57e116f64b4b1d8d1e1c694
-
SSDEEP
3072:2HeriftL/WSo1vDb53j/8WGUzaqVh4LI8zQpnA:2+rA/WSo1rl3ALrlHQpnA
Score10/10-
Detects command variations typically used by ransomware
-
Detects executables containing many references to VEEAM. Observed in ransomware
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-