General

  • Target

    2024-04-28_55c81a0e8d0ce1077f061b2069e91aa8_ryuk

  • Size

    1.7MB

  • Sample

    240428-d4318sfb69

  • MD5

    55c81a0e8d0ce1077f061b2069e91aa8

  • SHA1

    f0ade6672b0f6c50aa284a8e5910447338469419

  • SHA256

    55621b111ed8cf69b2506cdaab98598d4d72c882ca4ca407d0445f3568f694be

  • SHA512

    ea31cb87651410ab91019a0dc9c6647de5dcee413be69d6b5ab65911ff3a978423921b5feb18bff52e188648b1be204895b67dbf06d91e716b931e6ebda9c6e6

  • SSDEEP

    24576:gRAugMDUvC+ksSsqjnhMgeiCl7G0nehbGZpbD:QJUK+pWDmg27RnWGj

Malware Config

Targets

    • Target

      2024-04-28_55c81a0e8d0ce1077f061b2069e91aa8_ryuk

    • Size

      1.7MB

    • MD5

      55c81a0e8d0ce1077f061b2069e91aa8

    • SHA1

      f0ade6672b0f6c50aa284a8e5910447338469419

    • SHA256

      55621b111ed8cf69b2506cdaab98598d4d72c882ca4ca407d0445f3568f694be

    • SHA512

      ea31cb87651410ab91019a0dc9c6647de5dcee413be69d6b5ab65911ff3a978423921b5feb18bff52e188648b1be204895b67dbf06d91e716b931e6ebda9c6e6

    • SSDEEP

      24576:gRAugMDUvC+ksSsqjnhMgeiCl7G0nehbGZpbD:QJUK+pWDmg27RnWGj

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Tasks