General

  • Target

    2024-06-07_da4c702feb4173096677bd03ddc4d30e_ryuk

  • Size

    9.5MB

  • Sample

    240607-ctjzyahb77

  • MD5

    da4c702feb4173096677bd03ddc4d30e

  • SHA1

    91adfe6fc5e4572aa5e10ffd5969572b749cae24

  • SHA256

    c5edf63845834710262412672f13acb297b5b9da97c7fa3daddf7505887ea9af

  • SHA512

    56afd6c0b649f1752820274f70da1525a0ab579625277d11c4f72aced15cd84f262c629867ade300c565d3498cf3fb8d947f6689c839ce499af7a8f3bbf15519

  • SSDEEP

    196608:pA/FqrZe0MhC85r3uO1Z3JXLtdDfkx3ye4RU7r:eqslAAr+O1xptuxmy

Score
7/10

Malware Config

Targets

    • Target

      2024-06-07_da4c702feb4173096677bd03ddc4d30e_ryuk

    • Size

      9.5MB

    • MD5

      da4c702feb4173096677bd03ddc4d30e

    • SHA1

      91adfe6fc5e4572aa5e10ffd5969572b749cae24

    • SHA256

      c5edf63845834710262412672f13acb297b5b9da97c7fa3daddf7505887ea9af

    • SHA512

      56afd6c0b649f1752820274f70da1525a0ab579625277d11c4f72aced15cd84f262c629867ade300c565d3498cf3fb8d947f6689c839ce499af7a8f3bbf15519

    • SSDEEP

      196608:pA/FqrZe0MhC85r3uO1Z3JXLtdDfkx3ye4RU7r:eqslAAr+O1xptuxmy

    Score
    7/10
    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks