General

  • Target

    2025-03-06_8cb20120cbffa976277c992d2fc1c633_ryuk

  • Size

    664KB

  • Sample

    250306-gp787azzdz

  • MD5

    8cb20120cbffa976277c992d2fc1c633

  • SHA1

    57971dc11c99c2261242e24058fb9528a6219f96

  • SHA256

    9f7fcc877645899abcf028022a04454d81b5f757c825500c2278fa84ba7799fd

  • SHA512

    e1a1aa76978e64fa9413974d271e602b76f8a6410c87c119f5a8a03eb52c85a8b3aac20928f2d0b3bf4c41485e2a2e9f0b4aafcf45ffd7b59c2f6e42276f6b91

  • SSDEEP

    12288:rs9hR66kSoCU5qJSr1eCyUZbOj39fyf4MgqAUHUzTshp1dIWcI:+ROSoCU5qJSr1eCyJZfyf4Mgq9eTsIJI

Malware Config

Targets

    • Target

      2025-03-06_8cb20120cbffa976277c992d2fc1c633_ryuk

    • Size

      664KB

    • MD5

      8cb20120cbffa976277c992d2fc1c633

    • SHA1

      57971dc11c99c2261242e24058fb9528a6219f96

    • SHA256

      9f7fcc877645899abcf028022a04454d81b5f757c825500c2278fa84ba7799fd

    • SHA512

      e1a1aa76978e64fa9413974d271e602b76f8a6410c87c119f5a8a03eb52c85a8b3aac20928f2d0b3bf4c41485e2a2e9f0b4aafcf45ffd7b59c2f6e42276f6b91

    • SSDEEP

      12288:rs9hR66kSoCU5qJSr1eCyUZbOj39fyf4MgqAUHUzTshp1dIWcI:+ROSoCU5qJSr1eCyJZfyf4Mgq9eTsIJI

    • Azov

      A wiper seeking only damage, first seen in 2022.

    • Azov family

    • Renames multiple (1262) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks