General
-
Target
2024-09-08_b2a2929ff16a5f07d021f3cec3f1ec09_ryuk
-
Size
1.5MB
-
Sample
240908-e28pdaybna
-
MD5
b2a2929ff16a5f07d021f3cec3f1ec09
-
SHA1
3bd04f0ef6618bed71cb4ba757c7ed5f7503794c
-
SHA256
475dc5a17496e8ef31853d080902fcee92fde5d5c8df93c8f95fbb8d82460249
-
SHA512
c1d7f8faab7750bc49dbc4b8b9ba772c3608e1d81464f536900c007648fa054f0ac49aa5254321210469992ae0e044f656b1554833217f18f0a54cb1ce534d72
-
SSDEEP
24576:I3oH6mhNF4Xx7AMsqjnhMgeiCl7G0nehbGZpbD:KoHRFEBA4Dmg27RnWGj
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-08_b2a2929ff16a5f07d021f3cec3f1ec09_ryuk.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-08_b2a2929ff16a5f07d021f3cec3f1ec09_ryuk.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
2024-09-08_b2a2929ff16a5f07d021f3cec3f1ec09_ryuk
-
Size
1.5MB
-
MD5
b2a2929ff16a5f07d021f3cec3f1ec09
-
SHA1
3bd04f0ef6618bed71cb4ba757c7ed5f7503794c
-
SHA256
475dc5a17496e8ef31853d080902fcee92fde5d5c8df93c8f95fbb8d82460249
-
SHA512
c1d7f8faab7750bc49dbc4b8b9ba772c3608e1d81464f536900c007648fa054f0ac49aa5254321210469992ae0e044f656b1554833217f18f0a54cb1ce534d72
-
SSDEEP
24576:I3oH6mhNF4Xx7AMsqjnhMgeiCl7G0nehbGZpbD:KoHRFEBA4Dmg27RnWGj
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Drops file in System32 directory
-