General

  • Target

    2024-05-24_8a25afd4f04f7b8d812ff4db0210ab33_ryuk

  • Size

    140KB

  • MD5

    8a25afd4f04f7b8d812ff4db0210ab33

  • SHA1

    aa19769dd6c37a53c128285310ea3e3f42cff9b5

  • SHA256

    f1a46d7ec415718bf63849dd5e9ed0ad28ad7c825c0d80c8e779c55db0de28fd

  • SHA512

    899157e08e5462522fc7d49f159e05aeed7b7aa131370f536e2c94a6fa577fdaba788fe67836129a5a79d2bce29b7e42880d4172d0b445929bab03440083e179

  • SSDEEP

    3072:egKsEF7Wf33SdvlRmhYHP+8Pt1OOxkPo:jBwK3SBDmhYlOo

Score
10/10

Malware Config

Signatures

  • Detects command variations typically used by ransomware 1 IoCs
  • Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-24_8a25afd4f04f7b8d812ff4db0210ab33_ryuk
    .exe windows:5 windows x86 arch:x86

    1d0b6b925df56e49ee2768263a3e72dc


    Headers

    Imports

    Sections