General
-
Target
JaffaCakes118_fbb346ad0acdc9e1926d5326f5738be955818e4ec19217e0de357ba3930731ed
-
Size
182KB
-
Sample
241224-dlg12s1jdp
-
MD5
e1ecd73648bbd289139e6b18e0e5b3a9
-
SHA1
a580daf892dfe73be5657913b3c51710c4edad86
-
SHA256
fbb346ad0acdc9e1926d5326f5738be955818e4ec19217e0de357ba3930731ed
-
SHA512
c99b653a6dbe66de9e44c0b5db963a397a61008ffb676e9a37953699f36c148c132842fce925295ec2532e4015878f3d87d479fd30fa38039d95456f03d22651
-
SSDEEP
3072:+9/PBOZzEdyhBrq4hsIfjTUdZyADcj8w2PnmAjD1kOiXCbZ350pmeLH3t:C3BOZzEdIBO4JfXUdkr8OAf1kOiyVJed
Static task
static1
Behavioral task
behavioral1
Sample
b218ea35335833ba6dab543183314754db42bace4e62cf5950447c743b0ea4f6.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
b218ea35335833ba6dab543183314754db42bace4e62cf5950447c743b0ea4f6.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\users\Public\RyukReadMe.html
ryuk
http://lgjpuim5fe3pejmllygcffape3djui6k2a5pcbpuyvps3h4ajb7yf4id.onion
Targets
-
-
Target
b218ea35335833ba6dab543183314754db42bace4e62cf5950447c743b0ea4f6
-
Size
322KB
-
MD5
d5793b66a9a31f2ebfea5f9804d77dab
-
SHA1
4f98055913500597daba98d6fd6321d007a4c271
-
SHA256
b218ea35335833ba6dab543183314754db42bace4e62cf5950447c743b0ea4f6
-
SHA512
06dd7deaee850fe4fc48bb8e1f5fd7b7f152ec922318953a4ef61b18ba1f5e60785dbb3b6d14d87b4e61613bfdee2d23a6043213411d2b788a6736286db9170a
-
SSDEEP
6144:o+C8oeP7aBFjcGv0deUkE0vNz1tVCF7OfmoQc:o+FP7k9cGckU/0v1rVoc
Score10/10-
Ryuk family
-
Renames multiple (4778) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Drops desktop.ini file(s)
-