General
-
Target
241210-b3gqhaypes_pw_infected.zip.zip
-
Size
192KB
-
Sample
250102-mrjw9syjfv
-
MD5
4d24489d3c6a2ea490bdcccb7d850694
-
SHA1
4fdafc6eedf5695371c5ffe97c450221b83d8d70
-
SHA256
3b21b98d92725cfd4d253b0022bd2cc1bba910e0ce928a94fa970cc9bca5a992
-
SHA512
e295d0537870d789961ac907b412577517ba457438a6bfc379b60650259f535317bed2323fcbbd95f2502e89204524a6df8e485c35a1ed34c9ec311520b0a670
-
SSDEEP
6144:59FVWtna4njqbF6jQgxMmoAYRMV7no9wa:51Wt5+VgoHuha
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-10_7bcbd03a264f616bcbf64dd973c9e120_luca-stealer_ryuk.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-10_7bcbd03a264f616bcbf64dd973c9e120_luca-stealer_ryuk.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
1NQ42zc51stA4WAVkUK8uqFAjo1DbWv4Kz
Targets
-
-
Target
2024-12-10_7bcbd03a264f616bcbf64dd973c9e120_luca-stealer_ryuk
-
Size
378KB
-
MD5
7bcbd03a264f616bcbf64dd973c9e120
-
SHA1
5d2b6c04f634672ba0a11063dd1bc225446af2c2
-
SHA256
8f6bddd131f27472a4b974c3a141f8eba3a2c110b4b19d755408f67aed212b68
-
SHA512
f5b1dc62441d9bfdb57a7ae6ef41c46106e510ba73cea8372cc0a2765c192d27dc3f41c1dfadadcaaa39ff4fd87b0c84b81ecd3b14c8315edeca3dd0a8789242
-
SSDEEP
6144:sMfwnT2W/Pw5qjylH1/7QXMWibyJp/qQ:snTzPqHkiuX
-
Ryuk family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1