General

  • Target

    2025-03-06_c1535f3f7a386430a70201b36043a41b_ryuk

  • Size

    1.4MB

  • Sample

    250306-w339qavtcy

  • MD5

    c1535f3f7a386430a70201b36043a41b

  • SHA1

    3450fb6060d00072aedcf415df480112d3a1104e

  • SHA256

    ddf88c9e276bde10fe37215f370e7976f7874e7b047d038caf0f01f5d8ee7892

  • SHA512

    5805df845c7ce2dd2b635b27009686466d7e796b06034f49f71ce58dcb39b776f2406756c33ca928390d6135e34216cf97a0357366e033f70dd82bdf76b6cdf4

  • SSDEEP

    24576:pBomyGmzB8vM7f8TLOmuOY6yY6stYCvqUC03kA:pBomHYB80byLOmun656stYZc0A

Malware Config

Targets

    • Target

      2025-03-06_c1535f3f7a386430a70201b36043a41b_ryuk

    • Size

      1.4MB

    • MD5

      c1535f3f7a386430a70201b36043a41b

    • SHA1

      3450fb6060d00072aedcf415df480112d3a1104e

    • SHA256

      ddf88c9e276bde10fe37215f370e7976f7874e7b047d038caf0f01f5d8ee7892

    • SHA512

      5805df845c7ce2dd2b635b27009686466d7e796b06034f49f71ce58dcb39b776f2406756c33ca928390d6135e34216cf97a0357366e033f70dd82bdf76b6cdf4

    • SSDEEP

      24576:pBomyGmzB8vM7f8TLOmuOY6yY6stYCvqUC03kA:pBomHYB80byLOmun656stYZc0A

    • Azov

      A wiper seeking only damage, first seen in 2022.

    • Azov family

    • Renames multiple (114) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks