General
-
Target
2024-06-15_990b596bb17dd5b964401ff1ec331f66_cobalt-strike_ryuk
-
Size
420KB
-
Sample
240615-mndwvaxdka
-
MD5
990b596bb17dd5b964401ff1ec331f66
-
SHA1
13202981a631a58dcad6264784e41a4c411787d4
-
SHA256
d58f39fe2e5475edaa5969ce6a01f4091fb36dc3cee7dc6e4cb226810d096c5d
-
SHA512
6c02d6268a1bae588fd36e81ce322e3fdc696fc7cecd17e15db318b1b4442c616f2a2166001280ecbc1dba0a523804238892d7fe8a148528389d7356bbc81aa0
-
SSDEEP
6144:UyMVzRLs9TRZOBWfcSy0IG6LsJBNFwjaJg3PfcKrKywbfD7:Ujzls9NpZnnRdJAdGyk77
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-15_990b596bb17dd5b964401ff1ec331f66_cobalt-strike_ryuk.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-06-15_990b596bb17dd5b964401ff1ec331f66_cobalt-strike_ryuk.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
2024-06-15_990b596bb17dd5b964401ff1ec331f66_cobalt-strike_ryuk
-
Size
420KB
-
MD5
990b596bb17dd5b964401ff1ec331f66
-
SHA1
13202981a631a58dcad6264784e41a4c411787d4
-
SHA256
d58f39fe2e5475edaa5969ce6a01f4091fb36dc3cee7dc6e4cb226810d096c5d
-
SHA512
6c02d6268a1bae588fd36e81ce322e3fdc696fc7cecd17e15db318b1b4442c616f2a2166001280ecbc1dba0a523804238892d7fe8a148528389d7356bbc81aa0
-
SSDEEP
6144:UyMVzRLs9TRZOBWfcSy0IG6LsJBNFwjaJg3PfcKrKywbfD7:Ujzls9NpZnnRdJAdGyk77
Score10/10-
Renames multiple (109) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-