General

  • Target

    2024-10-03_18fc97ec28a00c867b3cd7781e0cb1e9_ryuk

  • Size

    1.5MB

  • Sample

    241003-w36pvazeml

  • MD5

    18fc97ec28a00c867b3cd7781e0cb1e9

  • SHA1

    43a2c987bfc632bfcd67f0c35bf92ce6529fba62

  • SHA256

    05805d85fb7865190cbf7e876c6734c0ee1b558337bf2f8bfbc5f85199698820

  • SHA512

    14c42fbfe983d0994b9596d45bd53ff75ffbf63a1410c2ae7c85f85408dd438fca7661dad0e03a9704bd9c18114525b0b15790ed4474635abacfaabfb88fcfb3

  • SSDEEP

    24576:piBE0LqwXeAVmYysqjnhMgeiCl7G0nehbGZpbD:lG5Xe6X2Dmg27RnWGj

Malware Config

Targets

    • Target

      2024-10-03_18fc97ec28a00c867b3cd7781e0cb1e9_ryuk

    • Size

      1.5MB

    • MD5

      18fc97ec28a00c867b3cd7781e0cb1e9

    • SHA1

      43a2c987bfc632bfcd67f0c35bf92ce6529fba62

    • SHA256

      05805d85fb7865190cbf7e876c6734c0ee1b558337bf2f8bfbc5f85199698820

    • SHA512

      14c42fbfe983d0994b9596d45bd53ff75ffbf63a1410c2ae7c85f85408dd438fca7661dad0e03a9704bd9c18114525b0b15790ed4474635abacfaabfb88fcfb3

    • SSDEEP

      24576:piBE0LqwXeAVmYysqjnhMgeiCl7G0nehbGZpbD:lG5Xe6X2Dmg27RnWGj

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks