General

  • Target

    2025-03-06_4e3dd5db8abc66706e31ef77f116c26d_ryuk

  • Size

    1.4MB

  • Sample

    250306-wds3fstycw

  • MD5

    4e3dd5db8abc66706e31ef77f116c26d

  • SHA1

    70e3514896f97c1be4403bb3a14533ab2f4cf162

  • SHA256

    c20778aa9cf82bf564aff137834c1f5063f08170e5653d1de8fe689bbd7a6fca

  • SHA512

    982d1d9ffc27f2d25d2c47a1571657056abc38abe4d2ecab020b3644155b605b690b2c07d854a18a5224a8c8cd7b2992270300f7f136e40adae9ab7e7fc43fcf

  • SSDEEP

    24576:+PRvMqB+5iNPKI7sfP0YlVa6xL88MfVeAgw5Z0cwnGbw:+PRvMqyiNh7sf8MVaKLvMflgwf0uw

Malware Config

Targets

    • Target

      2025-03-06_4e3dd5db8abc66706e31ef77f116c26d_ryuk

    • Size

      1.4MB

    • MD5

      4e3dd5db8abc66706e31ef77f116c26d

    • SHA1

      70e3514896f97c1be4403bb3a14533ab2f4cf162

    • SHA256

      c20778aa9cf82bf564aff137834c1f5063f08170e5653d1de8fe689bbd7a6fca

    • SHA512

      982d1d9ffc27f2d25d2c47a1571657056abc38abe4d2ecab020b3644155b605b690b2c07d854a18a5224a8c8cd7b2992270300f7f136e40adae9ab7e7fc43fcf

    • SSDEEP

      24576:+PRvMqB+5iNPKI7sfP0YlVa6xL88MfVeAgw5Z0cwnGbw:+PRvMqyiNh7sf8MVaKLvMflgwf0uw

    • Azov

      A wiper seeking only damage, first seen in 2022.

    • Azov family

    • Renames multiple (111) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks