General
-
Target
2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk
-
Size
170KB
-
Sample
240413-egxflseb7y
-
MD5
7f193964270dc3d207e4413890c95ab2
-
SHA1
e3b1b6adf8292e91234a455397d6496b5d92e322
-
SHA256
29824133432b929766e8287ad658b75ebfef08d62341c0bb338f239c6f114932
-
SHA512
16210a0ee45b1ea20921ea967e44ad569427960c8299840398c8024c7ef88d18ff4aaf18a6331bbc620992e6ae77c221a72381d136b9f4b1070d4cb788e410d4
-
SSDEEP
3072:2HeriftL/WSo1vDb53j/8WGUzaqVh4LI8zQpni:2+rA/WSo1rl3ALrlHQpni
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Targets
-
-
Target
2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk
-
Size
170KB
-
MD5
7f193964270dc3d207e4413890c95ab2
-
SHA1
e3b1b6adf8292e91234a455397d6496b5d92e322
-
SHA256
29824133432b929766e8287ad658b75ebfef08d62341c0bb338f239c6f114932
-
SHA512
16210a0ee45b1ea20921ea967e44ad569427960c8299840398c8024c7ef88d18ff4aaf18a6331bbc620992e6ae77c221a72381d136b9f4b1070d4cb788e410d4
-
SSDEEP
3072:2HeriftL/WSo1vDb53j/8WGUzaqVh4LI8zQpni:2+rA/WSo1rl3ALrlHQpni
Score10/10-
Detects command variations typically used by ransomware
-
Detects executables containing many references to VEEAM. Observed in ransomware
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-