General
-
Target
2024-06-04_610e47ace3a3902057b91c2884b1c5b1_ryuk
-
Size
19.4MB
-
Sample
240604-a4t7jsfc3t
-
MD5
610e47ace3a3902057b91c2884b1c5b1
-
SHA1
2dd8f3f668bb9be5898e57ec54ce6a5bbcb13e4c
-
SHA256
f6dfdce66fb0cf3e6690431067c2ce72213979d49730e236790170a2be1f82f5
-
SHA512
ac8a2b10b27e101f3e23c6f62ac4908f4721cdb7e8377a036b183b3a3c0b3c265ce5a3431c55c870a08f8cf91ab55d320df73e094d3273280751c6e28176b372
-
SSDEEP
393216:ikFJR+VHkTwVyLgeF4dGPWQCacxENBbyN+guKd8ZIUELVqcXILww:7AZkUYLgZuUapnbm+TKuZIXVqQIL
Behavioral task
behavioral1
Sample
2024-06-04_610e47ace3a3902057b91c2884b1c5b1_ryuk.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
2024-06-04_610e47ace3a3902057b91c2884b1c5b1_ryuk
-
Size
19.4MB
-
MD5
610e47ace3a3902057b91c2884b1c5b1
-
SHA1
2dd8f3f668bb9be5898e57ec54ce6a5bbcb13e4c
-
SHA256
f6dfdce66fb0cf3e6690431067c2ce72213979d49730e236790170a2be1f82f5
-
SHA512
ac8a2b10b27e101f3e23c6f62ac4908f4721cdb7e8377a036b183b3a3c0b3c265ce5a3431c55c870a08f8cf91ab55d320df73e094d3273280751c6e28176b372
-
SSDEEP
393216:ikFJR+VHkTwVyLgeF4dGPWQCacxENBbyN+guKd8ZIUELVqcXILww:7AZkUYLgZuUapnbm+TKuZIXVqQIL
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-