F:\Office\Target\x64\ship\postc2r\x-none\msohtmed.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-05_a10081864df0f4ab60e3f85add8f1494_ryuk.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-05_a10081864df0f4ab60e3f85add8f1494_ryuk.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-05_a10081864df0f4ab60e3f85add8f1494_ryuk
-
Size
13.5MB
-
MD5
a10081864df0f4ab60e3f85add8f1494
-
SHA1
18ba46d91936e51bcb63be61c870050a0aae8c98
-
SHA256
a0fd90a42cb6eded5a93a4398efe331678599f951e91493814f5191bd8ff4cd9
-
SHA512
4a7efa8a0df688d29db8f72a6427092d540e7da5cef8e3a0cddb19a5af7ed9c9b653b425e92dd758fd01662ee1c70cc7175a6eb0f8cfc05c7f46107d34493e14
-
SSDEEP
98304:VOTxNDS5lSQqTIIIII62OXYdu4dqkGmDo+ZTNh6YdyFx0feUbYZfgs0Qlxrdq:VwTIIIII62hduoGczeU64sbdq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-08-05_a10081864df0f4ab60e3f85add8f1494_ryuk
Files
-
2024-08-05_a10081864df0f4ab60e3f85add8f1494_ryuk.exe windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Sections
.text Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.c2r Size: 512B - Virtual size: 276B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ