General
-
Target
JaffaCakes118_2b23e704cfd8d62a359ef0325bfd4aaef5249cf6567ab8eceb88395978e3291a
-
Size
380KB
-
Sample
241226-x9klmawpgl
-
MD5
f1edd6e9079c428701bf1ff2c2a91ecf
-
SHA1
cd3074ba1cc1ee426b631e2b9dc6ff14a66048d7
-
SHA256
2b23e704cfd8d62a359ef0325bfd4aaef5249cf6567ab8eceb88395978e3291a
-
SHA512
98fa7540e165557158497ad1e9e955dd4c026b156eb27d62b82c261d65f924e30b5a691fb9847a5f97550b45a20710a3491ddbeb42084e4fb81dea5a3b4f2dca
-
SSDEEP
6144:ujI+19QNyNYFgVzTvYte0Mnbpy3DqwE1yM9MiJ+/pTAO4NM1wtsCWDEfW5tG:2P1CsNsgpTkxoqi1yqJiD4NM1lDEfSG
Static task
static1
Behavioral task
behavioral1
Sample
e803f1a1acf079ff2ca62e02c924840a9334336e762b0992123035427ffbf894.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e803f1a1acf079ff2ca62e02c924840a9334336e762b0992123035427ffbf894.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\users\Public\RyukReadMe.html
ryuk
http://etnbhivw5fjqytbmvt2o6zle3avqn6rrugfc35kmcmedbbgqbxtknlqd.onion
Targets
-
-
Target
e803f1a1acf079ff2ca62e02c924840a9334336e762b0992123035427ffbf894
-
Size
836KB
-
MD5
c5cd1f0fe551a0ce5678a7c9d86e6450
-
SHA1
f584c89c1539520f280efd9bcd4cb3da37588979
-
SHA256
e803f1a1acf079ff2ca62e02c924840a9334336e762b0992123035427ffbf894
-
SHA512
40f9578b711e41cd166b24b8aa0bfb6dee01a8e4a46eb54591e61d97cfc5a83dc58fb4256dc05f756274cda65ad5d680f9e370ad0c825861fd7080e5da5fd2e4
-
SSDEEP
12288:9usRYNsWq1PfXPV/aA5hqOzpT3OKuvE2F8C+lBE7RDb5Xr4Cgi/:fxV/aoEOzpx8ZNXUCgi/
-
Ryuk family
-
Renames multiple (7819) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Dave packer
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-