General

  • Target

    2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk

  • Size

    170KB

  • MD5

    7f193964270dc3d207e4413890c95ab2

  • SHA1

    e3b1b6adf8292e91234a455397d6496b5d92e322

  • SHA256

    29824133432b929766e8287ad658b75ebfef08d62341c0bb338f239c6f114932

  • SHA512

    16210a0ee45b1ea20921ea967e44ad569427960c8299840398c8024c7ef88d18ff4aaf18a6331bbc620992e6ae77c221a72381d136b9f4b1070d4cb788e410d4

  • SSDEEP

    3072:2HeriftL/WSo1vDb53j/8WGUzaqVh4LI8zQpni:2+rA/WSo1rl3ALrlHQpni

Score
10/10

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-13_7f193964270dc3d207e4413890c95ab2_ryuk
    .exe windows:5 windows x64 arch:x64

    21de032c4f956048aee1e04ac102bfbd


    Headers

    Imports

    Sections