General
-
Target
2024-06-05_8a4b49ead004283b8c8f5324dbf93189_ryuk
-
Size
664KB
-
Sample
240605-zxg13shd6w
-
MD5
8a4b49ead004283b8c8f5324dbf93189
-
SHA1
8efe54837faf263d1f336d3b4da24cf497f614bd
-
SHA256
a68fac4e3592ccf103c7db6d5302634233f4fce7a4341f0696fe52512d401512
-
SHA512
571950c149095cff7fff2e61d5fb68756e7946b8d189307790b02b1a19c94f978b405cbe68637b4a811fcdfc76508e6d4cdb308d91e28b51193bb12a662fc081
-
SSDEEP
12288:Ls9YrzrSoCU5qJSr1eJXU3L0amgJmw6gqAHHUzTshcvNQC:frSoCU5qJSr1eJXNhgJmw6gqmeTZvNj
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-05_8a4b49ead004283b8c8f5324dbf93189_ryuk.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-05_8a4b49ead004283b8c8f5324dbf93189_ryuk.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-06-05_8a4b49ead004283b8c8f5324dbf93189_ryuk
-
Size
664KB
-
MD5
8a4b49ead004283b8c8f5324dbf93189
-
SHA1
8efe54837faf263d1f336d3b4da24cf497f614bd
-
SHA256
a68fac4e3592ccf103c7db6d5302634233f4fce7a4341f0696fe52512d401512
-
SHA512
571950c149095cff7fff2e61d5fb68756e7946b8d189307790b02b1a19c94f978b405cbe68637b4a811fcdfc76508e6d4cdb308d91e28b51193bb12a662fc081
-
SSDEEP
12288:Ls9YrzrSoCU5qJSr1eJXU3L0amgJmw6gqAHHUzTshcvNQC:frSoCU5qJSr1eJXNhgJmw6gqmeTZvNj
Score10/10-
Renames multiple (1097) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-