General
-
Target
tmpz3o4tlol
-
Size
152KB
-
Sample
240620-pkx7esxblh
-
MD5
32cbc69f85cc47d8e35dc20dfbda6948
-
SHA1
35dd5239977c2922a06389061cca846ec09453bb
-
SHA256
795db7bdad1befdd3ad942be79715f6b0c5083d859901b81657b590c9628790f
-
SHA512
f485a56c783dba3c15d691709a6736d5589194ec8f54e8d01342e7d6f4c54b4a56eae0fa49e150e8a13780fcb7e2e50337c8eaa026baf51774527351b365a25c
-
SSDEEP
3072:FnJc2mXEkovNxp/gR4DoBOX8CdMzCqV5NNFqe/P:7EsV/gekBIt9W3
Static task
static1
Behavioral task
behavioral1
Sample
tmpz3o4tlol.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
tmpz3o4tlol.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
Targets
-
-
Target
tmpz3o4tlol
-
Size
152KB
-
MD5
32cbc69f85cc47d8e35dc20dfbda6948
-
SHA1
35dd5239977c2922a06389061cca846ec09453bb
-
SHA256
795db7bdad1befdd3ad942be79715f6b0c5083d859901b81657b590c9628790f
-
SHA512
f485a56c783dba3c15d691709a6736d5589194ec8f54e8d01342e7d6f4c54b4a56eae0fa49e150e8a13780fcb7e2e50337c8eaa026baf51774527351b365a25c
-
SSDEEP
3072:FnJc2mXEkovNxp/gR4DoBOX8CdMzCqV5NNFqe/P:7EsV/gekBIt9W3
Score10/10-
Renames multiple (2744) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s)
-