General
-
Target
241217-w2srlatphz_pw_infected.zip
-
Size
199KB
-
Sample
250130-xw434szney
-
MD5
38e66101501c8772dad02d93ce9dfe3b
-
SHA1
a24a60704b14758f5adefe50ed8da1a7f358af94
-
SHA256
1d619909920477f1c13c79e88a8fd911d608dfb59f81c68c4f796a9f87affdef
-
SHA512
35a9dedb7d74554284e32722623285b971b8a3143676ad7752101aef968e366db5b8ac4e6156f1b4157631f5f58104c6276df111b819ec47db32b12206c51fe7
-
SSDEEP
6144:W46423CkeO8hcCBYKF8V6dG5zkt1XQfGqDRQ:j6x3CjO8OCBp86UktBuGqq
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-17_67164c4680d767fcc5dbe48c3586444c_luca-stealer_ryuk.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-12-17_67164c4680d767fcc5dbe48c3586444c_luca-stealer_ryuk.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk
Targets
-
-
Target
2024-12-17_67164c4680d767fcc5dbe48c3586444c_luca-stealer_ryuk
-
Size
384KB
-
MD5
67164c4680d767fcc5dbe48c3586444c
-
SHA1
059cea33a907a59d6f41b2aceef3571bf2a4ceb0
-
SHA256
9c21c7149cf5980ee64d5fbb3f78a336b122cf7e92335718bcc5fa45e9dafb25
-
SHA512
0db0054182afcb6c3b8564457224598985958fe409503a3b1954852bd9f54ecb5ee0bb68d7a8551f369836d7e825c1bb6cda9f47f66aa43ce10d6f1b30bfe31a
-
SSDEEP
6144:f5yaWtrA/WSo1rl3ALrlHQpn0BwK3SBDmhYfFQ:fTW6WSofcZ+KCIG
Score10/10-
Ryuk family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-