General

  • Target

    2024-05-23_9897ce10ef767dfa428f4af6abc424e4_ryuk

  • Size

    170KB

  • MD5

    9897ce10ef767dfa428f4af6abc424e4

  • SHA1

    9bb3325c1451be656a07224609ca8cade7c8ca91

  • SHA256

    f521262a40a67b1212f6430185835f8bae02b2a2e5516df83f042d7480ce4916

  • SHA512

    f23f8dccc5443005f63293e30bb07721ea001ebaf5719199d44fc26bca0de59e37841a206970acfab9946937cc66c10f7cddaca20ab5071c19bf3f8de5aa7405

  • SSDEEP

    3072:0qeriftL/WSo1vDb53j/8WGiS+vwu0GVhCLI8uIl:0trA/WSo1rl3ALiSRiIl

Score
10/10

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-23_9897ce10ef767dfa428f4af6abc424e4_ryuk
    .exe windows:5 windows x64 arch:x64

    21de032c4f956048aee1e04ac102bfbd


    Headers

    Imports

    Sections