General
-
Target
241217-w2srlatphz_pw_infected.zip
-
Size
199KB
-
Sample
250130-xpjhtssjcj
-
MD5
38e66101501c8772dad02d93ce9dfe3b
-
SHA1
a24a60704b14758f5adefe50ed8da1a7f358af94
-
SHA256
1d619909920477f1c13c79e88a8fd911d608dfb59f81c68c4f796a9f87affdef
-
SHA512
35a9dedb7d74554284e32722623285b971b8a3143676ad7752101aef968e366db5b8ac4e6156f1b4157631f5f58104c6276df111b819ec47db32b12206c51fe7
-
SSDEEP
6144:W46423CkeO8hcCBYKF8V6dG5zkt1XQfGqDRQ:j6x3CjO8OCBp86UktBuGqq
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-17_67164c4680d767fcc5dbe48c3586444c_luca-stealer_ryuk.exe
Resource
win10ltsc2021-20250128-es
Malware Config
Extracted
F:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Targets
-
-
Target
2024-12-17_67164c4680d767fcc5dbe48c3586444c_luca-stealer_ryuk
-
Size
384KB
-
MD5
67164c4680d767fcc5dbe48c3586444c
-
SHA1
059cea33a907a59d6f41b2aceef3571bf2a4ceb0
-
SHA256
9c21c7149cf5980ee64d5fbb3f78a336b122cf7e92335718bcc5fa45e9dafb25
-
SHA512
0db0054182afcb6c3b8564457224598985958fe409503a3b1954852bd9f54ecb5ee0bb68d7a8551f369836d7e825c1bb6cda9f47f66aa43ce10d6f1b30bfe31a
-
SSDEEP
6144:f5yaWtrA/WSo1rl3ALrlHQpn0BwK3SBDmhYfFQ:fTW6WSofcZ+KCIG
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Ryuk family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
1