General
-
Target
2024-08-17_327b781d09fdec65d4b99fb6b7a65359_ryuk
-
Size
2.0MB
-
Sample
240817-qphszaxfke
-
MD5
327b781d09fdec65d4b99fb6b7a65359
-
SHA1
8a0cf04df693fa1359db31286463411948e4efde
-
SHA256
72f012cd415e02fe23131bbc6b96c0add27b1ee7df5f734a7fd2fd3574fc730e
-
SHA512
af2bfd00e8d3b95a2b59ec35246e8907631bbafc51ed03e5bf7ea727ffe791b5892295698a1ffdbb8bf9a8e6a9ccd39f018c30876be99102618d29729ae011cc
-
SSDEEP
24576:4Nxa377uV3CF5lqJvF3S3HBYGxVJCXEzVVzoVxbCJLBPPQkkkkkkkkkki3ZAL2g3:4Nxa377uhJvshYGxVJlzDzSCV6LT8u
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-17_327b781d09fdec65d4b99fb6b7a65359_ryuk.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-17_327b781d09fdec65d4b99fb6b7a65359_ryuk.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\RESTORE_FILES.txt
azov
Targets
-
-
Target
2024-08-17_327b781d09fdec65d4b99fb6b7a65359_ryuk
-
Size
2.0MB
-
MD5
327b781d09fdec65d4b99fb6b7a65359
-
SHA1
8a0cf04df693fa1359db31286463411948e4efde
-
SHA256
72f012cd415e02fe23131bbc6b96c0add27b1ee7df5f734a7fd2fd3574fc730e
-
SHA512
af2bfd00e8d3b95a2b59ec35246e8907631bbafc51ed03e5bf7ea727ffe791b5892295698a1ffdbb8bf9a8e6a9ccd39f018c30876be99102618d29729ae011cc
-
SSDEEP
24576:4Nxa377uV3CF5lqJvF3S3HBYGxVJCXEzVVzoVxbCJLBPPQkkkkkkkkkki3ZAL2g3:4Nxa377uhJvshYGxVJlzDzSCV6LT8u
Score10/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-