General
-
Target
2024-06-18_f896a78cc732b6d129b7e5f47dd080c2_ryuk
-
Size
4.2MB
-
Sample
240618-samvgssfqr
-
MD5
f896a78cc732b6d129b7e5f47dd080c2
-
SHA1
26184be292694504315a0f86314727bf08a62e21
-
SHA256
bb8d42cd75e7930cbad862a051d1aca7f4907cd42e838dda7e152e4dbf4cfcb2
-
SHA512
d41bc61c6a3557018c7206ac0d43832d73a3d0ed15407a95897c9f4570b84ed905120654ddb480a0254ad7c343ab60eda611ce2020c7f678ff80fee32121a7a9
-
SSDEEP
49152:OZqK95QhxVOlBWD9rqGLi0iIGTHI6DOnIIeNxu6xl1aZt6m5xbzDI6bpsRJrAGGo:W2D8+iFIIm3Gob5iEuwE
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-18_f896a78cc732b6d129b7e5f47dd080c2_ryuk.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-18_f896a78cc732b6d129b7e5f47dd080c2_ryuk
-
Size
4.2MB
-
MD5
f896a78cc732b6d129b7e5f47dd080c2
-
SHA1
26184be292694504315a0f86314727bf08a62e21
-
SHA256
bb8d42cd75e7930cbad862a051d1aca7f4907cd42e838dda7e152e4dbf4cfcb2
-
SHA512
d41bc61c6a3557018c7206ac0d43832d73a3d0ed15407a95897c9f4570b84ed905120654ddb480a0254ad7c343ab60eda611ce2020c7f678ff80fee32121a7a9
-
SSDEEP
49152:OZqK95QhxVOlBWD9rqGLi0iIGTHI6DOnIIeNxu6xl1aZt6m5xbzDI6bpsRJrAGGo:W2D8+iFIIm3Gob5iEuwE
Score10/10-
Renames multiple (8799) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-