General
-
Target
2024-04-19_2545f67c8e64a3155e2b38af93be2384_ryuk
-
Size
2.8MB
-
Sample
240420-adyr2sbh7z
-
MD5
2545f67c8e64a3155e2b38af93be2384
-
SHA1
9834ed79f230a41458abd7e20b3c61cd05579f84
-
SHA256
f22130568e8b133f8ee26ad002e3f3323cd1c7f6e1025f0fd27c5977fbe3e67a
-
SHA512
a91974ac6817f23242ec998e2d0d91b5a6e7c414997b2cb00db76ec215e96189157b2ab1fbd5acb5a6e76c1e242c827424d8b8169bdfc6990a652a421b5c5d12
-
SSDEEP
49152:CXYdaHvN8kHa507NUUWn043oHS3fvYwVq1/xT3DDbw0TUqy+Nwd:8WohS3Yw8yGE
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-19_2545f67c8e64a3155e2b38af93be2384_ryuk.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-19_2545f67c8e64a3155e2b38af93be2384_ryuk.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-19_2545f67c8e64a3155e2b38af93be2384_ryuk
-
Size
2.8MB
-
MD5
2545f67c8e64a3155e2b38af93be2384
-
SHA1
9834ed79f230a41458abd7e20b3c61cd05579f84
-
SHA256
f22130568e8b133f8ee26ad002e3f3323cd1c7f6e1025f0fd27c5977fbe3e67a
-
SHA512
a91974ac6817f23242ec998e2d0d91b5a6e7c414997b2cb00db76ec215e96189157b2ab1fbd5acb5a6e76c1e242c827424d8b8169bdfc6990a652a421b5c5d12
-
SSDEEP
49152:CXYdaHvN8kHa507NUUWn043oHS3fvYwVq1/xT3DDbw0TUqy+Nwd:8WohS3Yw8yGE
Score10/10-
Renames multiple (8300) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-