General
-
Target
2024-08-23_253af7a95177d9e12e8b96e7df6d5408_hijackloader_ryuk
-
Size
4.5MB
-
Sample
240823-zq1vlsyanj
-
MD5
253af7a95177d9e12e8b96e7df6d5408
-
SHA1
77dbef638c396c91f858bdb5f1f42eb3b9f1adbb
-
SHA256
308a9ca147d08bf5e6b48dbc0ab1d3ab5d03a06d6dd5bb62484f53209ec0b74c
-
SHA512
88d8da90aeccd961849e58f595eb651864ce0da64c03e7e9e904f20850232bbd5a485864bfabb979b8ca803cf79123b73cde02aa31e6d36b78a51cd35807daf9
-
SSDEEP
49152:o8f9ZOCnF0KhLemLNEo9QR+k9jdAsizqxSiZ4K5MZqkL92c6nkdmbbsiIerM1R6X:KrZ4K5M+XbsiIewG+x6xZ144
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-23_253af7a95177d9e12e8b96e7df6d5408_hijackloader_ryuk.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-23_253af7a95177d9e12e8b96e7df6d5408_hijackloader_ryuk.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\RESTORE_FILES.txt
azov
Targets
-
-
Target
2024-08-23_253af7a95177d9e12e8b96e7df6d5408_hijackloader_ryuk
-
Size
4.5MB
-
MD5
253af7a95177d9e12e8b96e7df6d5408
-
SHA1
77dbef638c396c91f858bdb5f1f42eb3b9f1adbb
-
SHA256
308a9ca147d08bf5e6b48dbc0ab1d3ab5d03a06d6dd5bb62484f53209ec0b74c
-
SHA512
88d8da90aeccd961849e58f595eb651864ce0da64c03e7e9e904f20850232bbd5a485864bfabb979b8ca803cf79123b73cde02aa31e6d36b78a51cd35807daf9
-
SSDEEP
49152:o8f9ZOCnF0KhLemLNEo9QR+k9jdAsizqxSiZ4K5MZqkL92c6nkdmbbsiIerM1R6X:KrZ4K5M+XbsiIewG+x6xZ144
-
Drops startup file
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-