General
-
Target
2024-08-17_3eca70b0239eb7c8db36531e448fb8c9_ryuk
-
Size
3.4MB
-
Sample
240817-ssgq7avhlm
-
MD5
3eca70b0239eb7c8db36531e448fb8c9
-
SHA1
c88bad0a95e24db82d7b12eb6024962f7e2c3458
-
SHA256
d3f60eab05327cffe6e223cf8c7d6402eed5277c04452ea9de7fe77d6e8f437c
-
SHA512
b6ac054dac6c2f70feea88f495efff7023a7746913a0de52d719909f26be49e3222568e724943e6a8deccca85a959e531f98ac4f03f66391b66bd194cfdbab1d
-
SSDEEP
49152:5urY+OPdCzMP9ANwqegqr7UCrwlkuXf4/Susm4jeU2o1YaYUScPs8jMlMOS9eyc/:KWqzfISusmo1iss8oltHyGR
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-17_3eca70b0239eb7c8db36531e448fb8c9_ryuk.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-17_3eca70b0239eb7c8db36531e448fb8c9_ryuk.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\RESTORE_FILES.txt
azov
Targets
-
-
Target
2024-08-17_3eca70b0239eb7c8db36531e448fb8c9_ryuk
-
Size
3.4MB
-
MD5
3eca70b0239eb7c8db36531e448fb8c9
-
SHA1
c88bad0a95e24db82d7b12eb6024962f7e2c3458
-
SHA256
d3f60eab05327cffe6e223cf8c7d6402eed5277c04452ea9de7fe77d6e8f437c
-
SHA512
b6ac054dac6c2f70feea88f495efff7023a7746913a0de52d719909f26be49e3222568e724943e6a8deccca85a959e531f98ac4f03f66391b66bd194cfdbab1d
-
SSDEEP
49152:5urY+OPdCzMP9ANwqegqr7UCrwlkuXf4/Susm4jeU2o1YaYUScPs8jMlMOS9eyc/:KWqzfISusmo1iss8oltHyGR
Score10/10-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-