General

  • Target

    2025-03-06_6047b9c8cc65c1c916615f790e9eafc6_ryuk

  • Size

    664KB

  • Sample

    250306-1z9dsayr18

  • MD5

    6047b9c8cc65c1c916615f790e9eafc6

  • SHA1

    416dba062f1bd8e9c22ed522a7b03678fa0eb927

  • SHA256

    d1b99dbc8275d3057af02f792dd6eaa8d57e8681e5591dfdd018363589543971

  • SHA512

    76b840b01548fa61c7890747f2dd3e98658f59ce9c6ebb337d27a862d854861f1b579e69b3536256ef2ea87c478159355f7da6ddc9ff29dcc4fb6d886732bd4e

  • SSDEEP

    12288:5s9r6+RpSoCU5qJSr1e+FU4ryvz5WDt8gMAlHUzTshvq7C1jwY:SXSoCU5qJSr1e+Fc75WDt8gMMeTGq7ij

Malware Config

Targets

    • Target

      2025-03-06_6047b9c8cc65c1c916615f790e9eafc6_ryuk

    • Size

      664KB

    • MD5

      6047b9c8cc65c1c916615f790e9eafc6

    • SHA1

      416dba062f1bd8e9c22ed522a7b03678fa0eb927

    • SHA256

      d1b99dbc8275d3057af02f792dd6eaa8d57e8681e5591dfdd018363589543971

    • SHA512

      76b840b01548fa61c7890747f2dd3e98658f59ce9c6ebb337d27a862d854861f1b579e69b3536256ef2ea87c478159355f7da6ddc9ff29dcc4fb6d886732bd4e

    • SSDEEP

      12288:5s9r6+RpSoCU5qJSr1e+FU4ryvz5WDt8gMAlHUzTshvq7C1jwY:SXSoCU5qJSr1e+Fc75WDt8gMMeTGq7ij

    • Azov

      A wiper seeking only damage, first seen in 2022.

    • Azov family

    • Renames multiple (1910) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks