General
-
Target
2024-05-07_9518fac20bfdbbc4931e459b19b3368b_ryuk
-
Size
18.0MB
-
Sample
240507-m989wadc81
-
MD5
9518fac20bfdbbc4931e459b19b3368b
-
SHA1
c4583f6df58e591c0b2d64ca41d1ac5d553e0090
-
SHA256
489eff4c57afd81d49f50b84134c405d8723e92d0b5c1ed776fa246a735d6786
-
SHA512
5ee30d4ed1cdb2f9c971d82bb135454336e2421cc1fda70481bce2d3920b73f9da0a13debbb2e1836af08e16d5e0d90b426124067c8069e669be73ec9d6b7817
-
SSDEEP
393216:xrn/z3FHAL4CmYYIK3S8aHPCM2k5PnfNkz9:Bn/7G8bIKi8aaYne
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-07_9518fac20bfdbbc4931e459b19b3368b_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-07_9518fac20bfdbbc4931e459b19b3368b_ryuk.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
2024-05-07_9518fac20bfdbbc4931e459b19b3368b_ryuk
-
Size
18.0MB
-
MD5
9518fac20bfdbbc4931e459b19b3368b
-
SHA1
c4583f6df58e591c0b2d64ca41d1ac5d553e0090
-
SHA256
489eff4c57afd81d49f50b84134c405d8723e92d0b5c1ed776fa246a735d6786
-
SHA512
5ee30d4ed1cdb2f9c971d82bb135454336e2421cc1fda70481bce2d3920b73f9da0a13debbb2e1836af08e16d5e0d90b426124067c8069e669be73ec9d6b7817
-
SSDEEP
393216:xrn/z3FHAL4CmYYIK3S8aHPCM2k5PnfNkz9:Bn/7G8bIKi8aaYne
Score9/10-
Detects executables Discord URL observed in first stage droppers
-
Detects executables containing URLs to raw contents of a Github gist
-
Detects executables packed with Enigma
-
Looks for VMWare drivers on disk
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-