General

  • Target

    02f95431883571b60ac8aba1827e84e0_JaffaCakes118

  • Size

    5.3MB

  • Sample

    240427-lsyldagf6x

  • MD5

    02f95431883571b60ac8aba1827e84e0

  • SHA1

    24bd00d1ca12306728a7f25b1847c8c10ca65355

  • SHA256

    8742ac94fd7adcb26361b7973f8a66a06968ae04f7d92d4876640d144eb43834

  • SHA512

    05bba479971f7516e72a83fcc2722199724fce42b14268dd43f6c691cb2f857846832b9d2f891a55419eeddce181f7ccda5793ddba45b3cae87061a6444d5b8a

  • SSDEEP

    98304:UxAWvB1FMUPdzjgAOH5XJtAyciIAW8ysGb4E/JOcdLYB27PtiSA1p+gaH:UxPKUPVjPOZUilW8y2E5qC

Malware Config

Extracted

Path

C:\users\Public\RyukReadMe.html

Family

ryuk

Ransom Note
nyazanorut1971@protonmail.com balance of shadow universe Ryuk
Emails

nyazanorut1971@protonmail.com

Targets

    • Target

      02f95431883571b60ac8aba1827e84e0_JaffaCakes118

    • Size

      5.3MB

    • MD5

      02f95431883571b60ac8aba1827e84e0

    • SHA1

      24bd00d1ca12306728a7f25b1847c8c10ca65355

    • SHA256

      8742ac94fd7adcb26361b7973f8a66a06968ae04f7d92d4876640d144eb43834

    • SHA512

      05bba479971f7516e72a83fcc2722199724fce42b14268dd43f6c691cb2f857846832b9d2f891a55419eeddce181f7ccda5793ddba45b3cae87061a6444d5b8a

    • SSDEEP

      98304:UxAWvB1FMUPdzjgAOH5XJtAyciIAW8ysGb4E/JOcdLYB27PtiSA1p+gaH:UxPKUPVjPOZUilW8y2E5qC

    • Ryuk

      Ransomware distributed via existing botnets, often Trickbot or Emotet.

    • Renames multiple (187) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Dave packer

      Detects executable using a packer named 'Dave' by the community, based on a string at the end.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

File and Directory Permissions Modification

1
T1222

Discovery

System Information Discovery

1
T1082

Tasks