General
-
Target
abfba6846b2f85b3b25dd71a5d910c356b64b04797c3a527e7f2f0c69137842fN.exe
-
Size
200KB
-
Sample
240926-k9flfsyfkp
-
MD5
592d8660d2670bc67e91e1cf2b80d7d0
-
SHA1
b85dcbe81d1f9c7877ed742bebfdd07216358d74
-
SHA256
abfba6846b2f85b3b25dd71a5d910c356b64b04797c3a527e7f2f0c69137842f
-
SHA512
040c2e18fb5b5ccfab1b604e96022c056e2c1a5bba8fbd3a0f6253f7fe9262f206b6e9aa508cc96bffedfd493735e4f274de114abfe36be94ae585f23134d172
-
SSDEEP
3072:FzOCLlTCrLBExk+bN4ejpMT/JUVWaI9shNI8:ROSTCRExkwOmM
Static task
static1
Behavioral task
behavioral1
Sample
abfba6846b2f85b3b25dd71a5d910c356b64b04797c3a527e7f2f0c69137842fN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
abfba6846b2f85b3b25dd71a5d910c356b64b04797c3a527e7f2f0c69137842fN.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\ConnectedDevicesPlatform\RyukReadMe.html
ryuk
Targets
-
-
Target
abfba6846b2f85b3b25dd71a5d910c356b64b04797c3a527e7f2f0c69137842fN.exe
-
Size
200KB
-
MD5
592d8660d2670bc67e91e1cf2b80d7d0
-
SHA1
b85dcbe81d1f9c7877ed742bebfdd07216358d74
-
SHA256
abfba6846b2f85b3b25dd71a5d910c356b64b04797c3a527e7f2f0c69137842f
-
SHA512
040c2e18fb5b5ccfab1b604e96022c056e2c1a5bba8fbd3a0f6253f7fe9262f206b6e9aa508cc96bffedfd493735e4f274de114abfe36be94ae585f23134d172
-
SSDEEP
3072:FzOCLlTCrLBExk+bN4ejpMT/JUVWaI9shNI8:ROSTCRExkwOmM
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops desktop.ini file(s)
-