General
-
Target
2024-11-19_b7810d0c1c94831ffef11223725bc9d1_ryuk
-
Size
4.1MB
-
Sample
241119-c132dszemr
-
MD5
b7810d0c1c94831ffef11223725bc9d1
-
SHA1
61d4d6685d39845413fa485d0e2b10f2f76a1498
-
SHA256
48a5eb3b0d4d5b8c3b8ae32b638ee0b0b5fb1ce45bb4c30463d697720a136974
-
SHA512
198ec366a15fcafd26dc56fb8deebef50a5cea76d92517c7bb37cd8c2e6add17dd2f8fa66ced258b317790f46bccf53e8ee56ee671df6d804987964d09036c96
-
SSDEEP
24576:8Smpzi3xGi50W+Zdel5ubFeROD+7QDtETt2eUTyFXnYsqWRp1EJ1yl9AbYM88cV/:/xGK0l3e3uhekD+StC2en90mVuy/VZ
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-19_b7810d0c1c94831ffef11223725bc9d1_ryuk.exe
Resource
win7-20240903-en
Malware Config
Extracted
meduza
193.3.19.151
-
anti_dbg
true
-
anti_vm
true
-
build_name
mrfree
-
extensions
.txt
-
grabber_max_size
4.194304e+06
-
port
15666
-
self_destruct
false
Targets
-
-
Target
2024-11-19_b7810d0c1c94831ffef11223725bc9d1_ryuk
-
Size
4.1MB
-
MD5
b7810d0c1c94831ffef11223725bc9d1
-
SHA1
61d4d6685d39845413fa485d0e2b10f2f76a1498
-
SHA256
48a5eb3b0d4d5b8c3b8ae32b638ee0b0b5fb1ce45bb4c30463d697720a136974
-
SHA512
198ec366a15fcafd26dc56fb8deebef50a5cea76d92517c7bb37cd8c2e6add17dd2f8fa66ced258b317790f46bccf53e8ee56ee671df6d804987964d09036c96
-
SSDEEP
24576:8Smpzi3xGi50W+Zdel5ubFeROD+7QDtETt2eUTyFXnYsqWRp1EJ1yl9AbYM88cV/:/xGK0l3e3uhekD+StC2en90mVuy/VZ
-
Meduza Stealer payload
-
Meduza family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-