Rewterz
Rewterz Threat Alert – SNAKE Ransomware – Active IOCs
October 7, 2021
Rewterz
Rewterz Threat Alert – Trickbot Malware – Active IOCs
October 7, 2021

Rewterz Threat Alert – Ryuk Ransomware – Active IOCs

Severity

High

Analysis Summary

Ryuk is the name of a ransomware family, first discovered in the wild in August 2018. It is one of the nastiest ransomware going around. Ryuk will lock your files or systems and holds them hostage for ransom. Ryuk is a type of ransomware used in targeted attacks, where the threat actors make sure that essential files are encrypted so they can ask for large ransom amounts. A typical Ryuk ransom demand can amount to a few hundred thousand dollars. Ryuk is one of the first ransomware families to include the ability to identify and encrypt network drives and resources, as well as delete shadow copies on the endpoint. This means the attackers can then disable Windows System Restore for users, making it impossible to recover from an attack without external backups.

Impact

  • File encryption
  • Privilege Escalation
  • Information Theft
  • Data Exfiltration
  • Network Compromise

Indicators of Compromise

MD5

  • d0fb4838a9b950e6311e0fd7d18c138c

SHA-256

  • a710f86690df75ee19d3295ee6f5b492007be392facefc5f3a196380d1f6e493
  • 2149709ebb8d1eb20eb812cae504044d62c51f742c6bcdf1857d6b4874332815
  • 8e8ff8365aafae50e32c0e9e517a71e519139d66bdd7b2072dfb55e876b2290a
  • 9dc7c09cc05e58fdf1507b9579ca6750c02489fffd1ab63f38484eb852ccf6a8
  • 8ab7efb570357759efef57efd0a4398f3783af97d1c3a5b866eab4ea423253b9
  • aa4c932d01e73a4cb02618de31613e7859f502c3fac5e3c18ad18e1ee8dfdf9d
  • 2765d6d8d410aaa6d135ffab4a07a21bc26ab7b7eab84c0db9e692c4326ac42c
  • 11204c810f09dacff42b5268289559625ec1eb11fc2c8e7fe99fedb82fa8ee84
  • e07a4230e27e6f1a151bd4009c2c8dd1cc84b7cf637b2ddc33ca162d0fb02453
  • 7dd246c96e152ea6426292b32aae3eb6e803a97b7757767154164d3bb5ffa26b
  • 0b6756e216304cb2821912b643d4cff20d39adeeb56b87418843cf80fb7524e1
  • 73df4c1be91cf74cf58187c75d9d485402c2e6f79b3ee4e7f5a1463d91d6c3f6
  • d3ed33417e069387e0bfd859e136794924bcad7d6acb65fe00f4df1de6ae1a1e
  • df1a1280e4f047de809d923bb5c83d2049dfc1b4ba99561dbfd5fbd54f5a0649
  • 87de37c3692d3b960ab8f73c7ecd12d7894cb2042ba5741ffbcf8e769f284d63
  • cb38964eb4a9f82a5bfc2c660be308f29f742d45f098fd2830a59eb83f1330ff
  • 0e04c938f72d900e5c5d761c97c677317191309d255765994bf823c6981618b5
  • 2cdecd787f223b1f5ce65724af8f0e09e5b0634c5e211550eac561ccfbe93000
  • c36b27053d6f9322b30300f7d9ca61cda4eb9392a4180d9504ca2551b983e5d5
  • 03e8871360707043243c0e979c81586bdb5c5281b3e71956737233dd8163ae36
  • d4b9687d037a65200c3a670306c722da35ec4de577d00d53b6ef7a1434ad695c
  • 2aa7673dbef41c5d692f5d1986658b89199c32a80c4f9a36d69b6e59877e03d7
  • 67bd0a06a564d4ebea6efbc53eabaee4a5a7e2563338035e9702bc2e450921e2
  • ce63681c52780727d9b888efbc767655561e137a9a4cb60d0bdef5dd83a4a237
  • b02a2b97d64f63030ccc3f40a17f21c13f33ac14fbb05a1dcca4c0ef9bf085d0
  • 2b0982cc0157c1f294002f21731db5d2d68e7f00a452905bdf7115790f2e8282
  • 50d27402666905b8069618af83cde2dd890fc63ec365e5e88b4f22f0524a4451
  • 42c3755fa558a4d4acbbe2e47d7f692f7419f04a0fd0a24204569ff1af31941b
  • bf831cf0381846109c78eaa7b0b20022966f438be0aad3cfbcf7b3efdc99311c
  • 85916eff9dbee22233b4887c587075442f7feff5242088234a9b7a4de535b60b
  • f31626bc9a9c57a9380b956491a4d3f128bda2dbb1a0905a1307cd03c2395cfa
  • fbfefda1d6e9cf82f4d3f6f8b59023fcb8cb730dbc7c6f8d4cc9c1ebef06ba9d

SHA-1

  • 1f96f64bd12434d6216040a20d6631f9d9d35c7b

Remediation

  • Block all threat indicators at your respective controls.
  • Search for IOCs in your environment.