General

  • Target

    JaffaCakes118_8bd0c2de7af721194571df16912e01228e4e1d2a2f26470d7947f231c05b4269

  • Size

    71KB

  • Sample

    241221-zj1k9szjgk

  • MD5

    0e77214161419f8e409ca2b7827011ca

  • SHA1

    7970b51a59e0969f0dc9a5658da73d50e2525922

  • SHA256

    8bd0c2de7af721194571df16912e01228e4e1d2a2f26470d7947f231c05b4269

  • SHA512

    d8069b6149dc1f49187332d0fbf6680224b83627f83fb6a7cbe1bc851960133a87a3289d8f41c497c300ea75ff99ad29d89f4ebfb903f956a778f814ace8a915

  • SSDEEP

    1536:g2ceJ0E6NflQlnYi8jPOIpUFNRs2GGbFiW8GQoXEmi7iqPlr:NK3V0al6iW8tKEb71PV

Malware Config

Extracted

Path

C:\users\Public\RyukReadMe.html

Family

ryuk

Ransom Note
[email protected] balance of shadow universe Ryuk

Targets

    • Target

      ec3da4ac9ec917e66ab943ab149119807922f64f2e4960ebadc36fe7520b300f

    • Size

      134KB

    • MD5

      0a0b0ac20e9fe72753e74def1e37724f

    • SHA1

      fd683b33ee10ba92e485f76fbad9b48a2e697358

    • SHA256

      ec3da4ac9ec917e66ab943ab149119807922f64f2e4960ebadc36fe7520b300f

    • SHA512

      3f5d8b747955fc5926767c04be7c7d414205d01e8a2e586d3e94f2a4da756b56b15a795ec5847894b21b39fba7d595d18898df60375c126998e6b638cf78a759

    • SSDEEP

      3072:lZkmuVEvfzS9ljrZU/bH0ffOkObkPnSh6/P:LkmQIW9ljrqbH0cwH

    • Ryuk

      Ransomware distributed via existing botnets, often Trickbot or Emotet.

    • Ryuk family

    • Renames multiple (4688) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v15

Tasks