General
-
Target
2024-10-03_18fc97ec28a00c867b3cd7781e0cb1e9_ryuk
-
Size
1.5MB
-
Sample
241003-w36pvazeml
-
MD5
18fc97ec28a00c867b3cd7781e0cb1e9
-
SHA1
43a2c987bfc632bfcd67f0c35bf92ce6529fba62
-
SHA256
05805d85fb7865190cbf7e876c6734c0ee1b558337bf2f8bfbc5f85199698820
-
SHA512
14c42fbfe983d0994b9596d45bd53ff75ffbf63a1410c2ae7c85f85408dd438fca7661dad0e03a9704bd9c18114525b0b15790ed4474635abacfaabfb88fcfb3
-
SSDEEP
24576:piBE0LqwXeAVmYysqjnhMgeiCl7G0nehbGZpbD:lG5Xe6X2Dmg27RnWGj
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-03_18fc97ec28a00c867b3cd7781e0cb1e9_ryuk.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-03_18fc97ec28a00c867b3cd7781e0cb1e9_ryuk.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
2024-10-03_18fc97ec28a00c867b3cd7781e0cb1e9_ryuk
-
Size
1.5MB
-
MD5
18fc97ec28a00c867b3cd7781e0cb1e9
-
SHA1
43a2c987bfc632bfcd67f0c35bf92ce6529fba62
-
SHA256
05805d85fb7865190cbf7e876c6734c0ee1b558337bf2f8bfbc5f85199698820
-
SHA512
14c42fbfe983d0994b9596d45bd53ff75ffbf63a1410c2ae7c85f85408dd438fca7661dad0e03a9704bd9c18114525b0b15790ed4474635abacfaabfb88fcfb3
-
SSDEEP
24576:piBE0LqwXeAVmYysqjnhMgeiCl7G0nehbGZpbD:lG5Xe6X2Dmg27RnWGj
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Drops file in System32 directory
-