Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 03:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-20_680a9c63e6d459a8c7c75360122f98d4_hijackloader_ryuk.exe
Resource
win7-20241010-en
windows7-x64
3 signatures
150 seconds
General
-
Target
2024-11-20_680a9c63e6d459a8c7c75360122f98d4_hijackloader_ryuk.exe
-
Size
1.4MB
-
MD5
680a9c63e6d459a8c7c75360122f98d4
-
SHA1
b8db117430c39820303e27d40883ab3c8508cf05
-
SHA256
9095393d34997cae8c568522d92b7ff1e4358e59a46be58453be8c5ac7da6042
-
SHA512
4261f9a82d8c4b4867ac1946e0d0427e76ca80804340b93b6d59ba6c30eb21093f7dac918143763beb6b4674aea2734df89f31bf9afab6b811466eb933548376
-
SSDEEP
24576:n9pfBeNtiWaDzOaB7E2qh/s3nI+msqTuToBGq1SN8:HioW0zOaB7E2C/s3IRDGqh
Malware Config
Extracted
Family
bumblebee
Botnet
21maca
C2
108.62.141.20:443
104.168.140.145:443
51.68.145.171:443
108.62.118.170:443
192.119.72.133:443
23.108.57.201:443
rc4.plain
Signatures
-
Bumblebee family
-
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
Processes:
2024-11-20_680a9c63e6d459a8c7c75360122f98d4_hijackloader_ryuk.exepid process 840 2024-11-20_680a9c63e6d459a8c7c75360122f98d4_hijackloader_ryuk.exe