Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-04-2024 00:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-04-05_bb3cef2577d61f6db132ea9127687653_ryuk.exe
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
General
-
Target
2024-04-05_bb3cef2577d61f6db132ea9127687653_ryuk.exe
-
Size
6.0MB
-
MD5
bb3cef2577d61f6db132ea9127687653
-
SHA1
23744c6489204c1c12a7db9f11736826df8612fc
-
SHA256
82c05e788b690d480d56cf4f093a7739d668934acdba574191a6ecc88e843bb5
-
SHA512
700cdf03182d0e86ac7daacda067e7603d0e7fe0d3bff112efb4eb8c968eac2af9033bf4b03e6d05ec92f955a2bc626ab43b52d1125c6ada11beb229a65470a2
-
SSDEEP
49152:xr3uXF+Kb8t3A+Gha2ImSJLuHHuFJajTpYEfSozlqBDMj74oNDdTxfZP:xr3uXFq0haJtin9
Malware Config
Extracted
Family
bumblebee
Botnet
proc_123
rc4.plain
Signatures
-
Detects executables referencing combination of virtualization drivers 2 IoCs
resource yara_rule behavioral1/memory/2524-1-0x0000000001DC0000-0x0000000001FD4000-memory.dmp INDICATOR_SUSPICIOUS_VM_Evasion_VirtDrvComb behavioral1/memory/2524-2-0x0000000001DC0000-0x0000000001FD4000-memory.dmp INDICATOR_SUSPICIOUS_VM_Evasion_VirtDrvComb -
Detects executables referencing virtualization MAC addresses 2 IoCs
resource yara_rule behavioral1/memory/2524-1-0x0000000001DC0000-0x0000000001FD4000-memory.dmp INDICATOR_SUSPICIOUS_VM_Evasion_MACAddrComb behavioral1/memory/2524-2-0x0000000001DC0000-0x0000000001FD4000-memory.dmp INDICATOR_SUSPICIOUS_VM_Evasion_MACAddrComb