Analysis
-
max time kernel
132s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 16:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-05-04_010d567d0d1d868448b16dfc46c59a43_ryuk.exe
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
General
-
Target
2024-05-04_010d567d0d1d868448b16dfc46c59a43_ryuk.exe
-
Size
1.4MB
-
MD5
010d567d0d1d868448b16dfc46c59a43
-
SHA1
d6a4c3402298582a5ac1dedf4c2e14a0035730f3
-
SHA256
318822896d2f9f7c54e230ab1fbd77e4225bd5d1edc002c56316a0106eca652e
-
SHA512
2df55aaaae8ea60c2164993c1e5e48635f3ee8a6a129e2151bc594ff14b0cd5ff9778cc240438902a0055855007efe6458d9617d34a22389a406d41ef1b6a8e8
-
SSDEEP
24576:ruAojA8HR776sO8p0qonGox07Vv4AlTe+MOF8G4VZ:ruBdHRH6kp0qgIx7RklN
Malware Config
Extracted
Family
bumblebee
Botnet
asd1234
rc4.plain
Signatures
-
Detects executables referencing combination of virtualization drivers 3 IoCs
resource yara_rule behavioral2/memory/4152-1-0x000001B1A2550000-0x000001B1A2764000-memory.dmp INDICATOR_SUSPICIOUS_VM_Evasion_VirtDrvComb behavioral2/memory/4152-2-0x000001B1A2550000-0x000001B1A2764000-memory.dmp INDICATOR_SUSPICIOUS_VM_Evasion_VirtDrvComb behavioral2/memory/4152-3-0x000001B1A2550000-0x000001B1A2764000-memory.dmp INDICATOR_SUSPICIOUS_VM_Evasion_VirtDrvComb -
Detects executables referencing virtualization MAC addresses 3 IoCs
resource yara_rule behavioral2/memory/4152-1-0x000001B1A2550000-0x000001B1A2764000-memory.dmp INDICATOR_SUSPICIOUS_VM_Evasion_MACAddrComb behavioral2/memory/4152-2-0x000001B1A2550000-0x000001B1A2764000-memory.dmp INDICATOR_SUSPICIOUS_VM_Evasion_MACAddrComb behavioral2/memory/4152-3-0x000001B1A2550000-0x000001B1A2764000-memory.dmp INDICATOR_SUSPICIOUS_VM_Evasion_MACAddrComb