General
-
Target
201001-ht2j1d6c1s_pw_infected.zip
-
Size
267KB
-
Sample
250128-xgcejsxrc1
-
MD5
1a9c08ef4bc6f92bc7cd412b5a1ba7f2
-
SHA1
8deccbc4fa45a2fb409897623aa8181123025a3b
-
SHA256
700df345dae5267e41e774f1e4e45b2a2addb0d4d50a59815e2a34ec589fb33d
-
SHA512
7db8d92ccdf8706ff2807a62e205bd17c876eb97d15b8121e07e0a657f29679c46459c6f188db6d0a8a7c3ed77e4e708bb08081250389a81de7efab2393b335b
-
SSDEEP
6144:K/YazAO7cSSU/a7WSfcnISTFPByuGG7ocjsT8v3atFV47QXLzUqa:K/TzzGU/aiSfcIST9B7ocj/v3aa5
Static task
static1
Behavioral task
behavioral1
Sample
bad_boi.exe
Resource
win7-20241023-es
Behavioral task
behavioral2
Sample
bad_boi.exe
Resource
win10ltsc2021-20250128-es
Malware Config
Extracted
C:\users\Public\RyukReadMe.html
ryuk
Targets
-
-
Target
bad_boi.exe
-
Size
376KB
-
MD5
7d3f19b760cb1958a2c4d9ca7492c406
-
SHA1
c3fa91438850c88c81c0712204a273e382d8fa7b
-
SHA256
f8bc1638ec3b04412f708233e8586e1d91f18f6715d68cba1a491d4a7f457da0
-
SHA512
64d14a7a3866c76d45bea7bee19d40f63241c777d8d259a8a79279cac51396fe9469f28fc68eaa8ab688af13a47c4c5af0d62005d93a4649f81e411b8f2eae91
-
SSDEEP
6144:jwHqh+1uu3RVmPY55eExdAev5wuSiRqAO1iNgLTBs4LhVJqRcelLQMo8:P+1uu3RVmPYaad5wuSiRqLNeRcZMo8
-
Ryuk family
-
Renames multiple (8298) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Dave packer
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Drops desktop.ini file(s)
-