Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 11:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-05-07_f4cac7f530910389ded9c795cc13e299_ryuk.exe
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
General
-
Target
2024-05-07_f4cac7f530910389ded9c795cc13e299_ryuk.exe
-
Size
1.4MB
-
MD5
f4cac7f530910389ded9c795cc13e299
-
SHA1
510a4a76856858213bf526d8d435c06bca4d6405
-
SHA256
ccc029998b00cd29335e0729d852becea2ebe6a9ce2547f963f71da97d07439f
-
SHA512
f4315285a6c2e0f53312753d9ec6583c56a300871bee063cb2afe6c9109e0428b82eab5c548bcadb95421a79f4145fdd404c9782e40fbf00defeef3a0bd2f3ab
-
SSDEEP
24576:TBjUP0akCHU0AE97scZI8c+zGXUUT8GDl4ZslSJkUrTgUWnIm50u2Jjr14:TVY0SHUz8bzjpGDSOldU1k12Rr
Malware Config
Extracted
Family
bumblebee
Botnet
asd1234
rc4.plain
Signatures
-
Detects executables referencing combination of virtualization drivers 2 IoCs
resource yara_rule behavioral1/memory/2168-1-0x0000000000650000-0x0000000000864000-memory.dmp INDICATOR_SUSPICIOUS_VM_Evasion_VirtDrvComb behavioral1/memory/2168-2-0x0000000000650000-0x0000000000864000-memory.dmp INDICATOR_SUSPICIOUS_VM_Evasion_VirtDrvComb -
Detects executables referencing virtualization MAC addresses 2 IoCs
resource yara_rule behavioral1/memory/2168-1-0x0000000000650000-0x0000000000864000-memory.dmp INDICATOR_SUSPICIOUS_VM_Evasion_MACAddrComb behavioral1/memory/2168-2-0x0000000000650000-0x0000000000864000-memory.dmp INDICATOR_SUSPICIOUS_VM_Evasion_MACAddrComb