General
-
Target
2024-11-06_97157c0cbe3762ec9b2515571f8c2265_ryuk
-
Size
3.6MB
-
Sample
241106-rzw9sa1mdx
-
MD5
97157c0cbe3762ec9b2515571f8c2265
-
SHA1
8544ed5273f6666654bca48fd413602a68f66e53
-
SHA256
6fbf227c5d4c713d0621a8045ee4e232094e84354b0824ae2ef0e9694e09b3f1
-
SHA512
194d7ecbf31695e75c065e711cac5526861e54782fb5d42bf85eafdf7984cab056d6f7ac3c961003f5b0286626afe95d90a1db01153523de38bde328e55d76ae
-
SSDEEP
49152:bByPnIG49AmfFxCXmoOiXXgPwZfv2vl+hG/exfF:
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-06_97157c0cbe3762ec9b2515571f8c2265_ryuk.exe
Resource
win7-20240903-en
Malware Config
Extracted
meduza
89.22.239.174
-
anti_dbg
true
-
anti_vm
true
-
build_name
mounov
-
extensions
.txt
-
grabber_max_size
4.194304e+06
-
port
15666
-
self_destruct
false
Targets
-
-
Target
2024-11-06_97157c0cbe3762ec9b2515571f8c2265_ryuk
-
Size
3.6MB
-
MD5
97157c0cbe3762ec9b2515571f8c2265
-
SHA1
8544ed5273f6666654bca48fd413602a68f66e53
-
SHA256
6fbf227c5d4c713d0621a8045ee4e232094e84354b0824ae2ef0e9694e09b3f1
-
SHA512
194d7ecbf31695e75c065e711cac5526861e54782fb5d42bf85eafdf7984cab056d6f7ac3c961003f5b0286626afe95d90a1db01153523de38bde328e55d76ae
-
SSDEEP
49152:bByPnIG49AmfFxCXmoOiXXgPwZfv2vl+hG/exfF:
-
Meduza Stealer payload
-
Meduza family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-