Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 11:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-05-07_f4cac7f530910389ded9c795cc13e299_ryuk.exe
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
General
-
Target
2024-05-07_f4cac7f530910389ded9c795cc13e299_ryuk.exe
-
Size
1.4MB
-
MD5
f4cac7f530910389ded9c795cc13e299
-
SHA1
510a4a76856858213bf526d8d435c06bca4d6405
-
SHA256
ccc029998b00cd29335e0729d852becea2ebe6a9ce2547f963f71da97d07439f
-
SHA512
f4315285a6c2e0f53312753d9ec6583c56a300871bee063cb2afe6c9109e0428b82eab5c548bcadb95421a79f4145fdd404c9782e40fbf00defeef3a0bd2f3ab
-
SSDEEP
24576:TBjUP0akCHU0AE97scZI8c+zGXUUT8GDl4ZslSJkUrTgUWnIm50u2Jjr14:TVY0SHUz8bzjpGDSOldU1k12Rr
Malware Config
Extracted
Family
bumblebee
Botnet
asd1234
rc4.plain
Signatures
-
Detects executables referencing combination of virtualization drivers 3 IoCs
resource yara_rule behavioral2/memory/2208-1-0x000002231DF90000-0x000002231E1A4000-memory.dmp INDICATOR_SUSPICIOUS_VM_Evasion_VirtDrvComb behavioral2/memory/2208-2-0x000002231DF90000-0x000002231E1A4000-memory.dmp INDICATOR_SUSPICIOUS_VM_Evasion_VirtDrvComb behavioral2/memory/2208-3-0x000002231DF90000-0x000002231E1A4000-memory.dmp INDICATOR_SUSPICIOUS_VM_Evasion_VirtDrvComb -
Detects executables referencing virtualization MAC addresses 3 IoCs
resource yara_rule behavioral2/memory/2208-1-0x000002231DF90000-0x000002231E1A4000-memory.dmp INDICATOR_SUSPICIOUS_VM_Evasion_MACAddrComb behavioral2/memory/2208-2-0x000002231DF90000-0x000002231E1A4000-memory.dmp INDICATOR_SUSPICIOUS_VM_Evasion_MACAddrComb behavioral2/memory/2208-3-0x000002231DF90000-0x000002231E1A4000-memory.dmp INDICATOR_SUSPICIOUS_VM_Evasion_MACAddrComb