General
-
Target
2024-02-29_c982cc6744a26fdced10652f43a45260_ryuk
-
Size
5.2MB
-
Sample
240229-lyxahadh28
-
MD5
c982cc6744a26fdced10652f43a45260
-
SHA1
3a598a09f708ef6664309006cc4809f89f1f0472
-
SHA256
6e10b7e5efbbd3c7310dce5d5ff531d223589a8684e281cd0e0e7299abdb360e
-
SHA512
8b0b5b1e40e1ec6193e675bae3fd3f2b423634554aad8a553d39e9970d29fa00e237141cf33f9246286315a50ed25898b67fc044b3e73a869d30c3cf7b29aa8e
-
SSDEEP
49152:ba8T2mh3mhW9MGhqh0ekXJ0fZxegTo2PhWhG1U98MjfgTc0udYIuCf4k+EMHzJi:emh3mhW9LAgXK2UoacF9/s3uDfn+EO0
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-29_c982cc6744a26fdced10652f43a45260_ryuk.exe
Resource
win7-20240221-en
Malware Config
Extracted
xworm
5.0
yuncraft.kozow.com:7000
cflKKtZhlFomE3sa
-
install_file
USB.exe
Targets
-
-
Target
2024-02-29_c982cc6744a26fdced10652f43a45260_ryuk
-
Size
5.2MB
-
MD5
c982cc6744a26fdced10652f43a45260
-
SHA1
3a598a09f708ef6664309006cc4809f89f1f0472
-
SHA256
6e10b7e5efbbd3c7310dce5d5ff531d223589a8684e281cd0e0e7299abdb360e
-
SHA512
8b0b5b1e40e1ec6193e675bae3fd3f2b423634554aad8a553d39e9970d29fa00e237141cf33f9246286315a50ed25898b67fc044b3e73a869d30c3cf7b29aa8e
-
SSDEEP
49152:ba8T2mh3mhW9MGhqh0ekXJ0fZxegTo2PhWhG1U98MjfgTc0udYIuCf4k+EMHzJi:emh3mhW9LAgXK2UoacF9/s3uDfn+EO0
-
Detect Xworm Payload
-
Detects Windows executables referencing non-Windows User-Agents
-
Legitimate hosting services abused for malware hosting/C2
-