General
-
Target
0195976bef64857fc4c658d47e08463c1c733a879b793642813df10904c3a8c8
-
Size
212KB
-
Sample
240304-vnxmysgg24
-
MD5
9951b7f5344d5d0e6728f90c1ffd0a3f
-
SHA1
5252a37cc0c4171f6261fbcc418d4fca83f0a543
-
SHA256
0195976bef64857fc4c658d47e08463c1c733a879b793642813df10904c3a8c8
-
SHA512
2ce934dbeb9888e8125856d0158f23a6c5d007a55f9d71287e308bcf312674642496a1f2aadfe276361b5c4945e37a5c3edde3be83dbdb8d531123fb2335f50f
-
SSDEEP
3072:skoemwJEECCvcVbQQFrUoR19V6To0Hqs3WvQ:ZEECCElQk3wqFQ
Static task
static1
Behavioral task
behavioral1
Sample
0195976bef64857fc4c658d47e08463c1c733a879b793642813df10904c3a8c8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0195976bef64857fc4c658d47e08463c1c733a879b793642813df10904c3a8c8.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
Targets
-
-
Target
0195976bef64857fc4c658d47e08463c1c733a879b793642813df10904c3a8c8
-
Size
212KB
-
MD5
9951b7f5344d5d0e6728f90c1ffd0a3f
-
SHA1
5252a37cc0c4171f6261fbcc418d4fca83f0a543
-
SHA256
0195976bef64857fc4c658d47e08463c1c733a879b793642813df10904c3a8c8
-
SHA512
2ce934dbeb9888e8125856d0158f23a6c5d007a55f9d71287e308bcf312674642496a1f2aadfe276361b5c4945e37a5c3edde3be83dbdb8d531123fb2335f50f
-
SSDEEP
3072:skoemwJEECCvcVbQQFrUoR19V6To0Hqs3WvQ:ZEECCElQk3wqFQ
Score10/10-
Detects command variations typically used by ransomware
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops desktop.ini file(s)
-