Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
05-05-2024 00:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-05-05_00ff22aa1cd8e42f276b2db1a2ed8be8_ryuk.exe
Resource
win7-20240215-en
windows7-x64
3 signatures
150 seconds
General
-
Target
2024-05-05_00ff22aa1cd8e42f276b2db1a2ed8be8_ryuk.exe
-
Size
1.4MB
-
MD5
00ff22aa1cd8e42f276b2db1a2ed8be8
-
SHA1
97918e8479f30f764845776b840f0be3d8660578
-
SHA256
279df02e660ac75812f61c5eacf72d83166d2db6bbc5f137a4ed057593d15547
-
SHA512
b6711c1626beae2938b8f5c60a2a57512e1f85d0d9eed36fdceab346278da06434d580a0f3de558eb01ce1fc15107c72a93a6d85b47010c84df21d2a2f5feb8c
-
SSDEEP
24576:2hzbfJ004vKs0fyft6f/VbIlZxs/KNLwopf341vCMvXXKw4ny8RJba3tNkI27d:wzbB00rseyVuhLK1/fKaw61IGd
Malware Config
Extracted
Family
bumblebee
Botnet
asd1234
rc4.plain
Signatures
-
Detects executables referencing combination of virtualization drivers 1 IoCs
resource yara_rule behavioral1/memory/2892-1-0x00000000006F0000-0x0000000000904000-memory.dmp INDICATOR_SUSPICIOUS_VM_Evasion_VirtDrvComb -
Detects executables referencing virtualization MAC addresses 1 IoCs
resource yara_rule behavioral1/memory/2892-1-0x00000000006F0000-0x0000000000904000-memory.dmp INDICATOR_SUSPICIOUS_VM_Evasion_MACAddrComb