Ryun Ransomware is a sophisticated piece of code written on the lines of
Hermes Ransomware. It demands 15 to 35 BTC from it victims to recover files.
Update: A new Sample of Ryuk Ransomware is spreading in the wild that implements Wake on LAN (WOL) feature. It extracts IP address form its victims ARP table and send a WOL request on the network. If it able to
awake a host it mounts "C$/admin" share, if successful the Ryuk deletes volume shadow copies and encrypt the drive. It appends "HARMES" to the end of the file as marker to itself that file is encrypted.
Ryun Ransomware Signatures
MD5: 5ac0f050f93f86e69026faea1fbb4450
SHA1: 9709774fde9ec740ad6fed8ed79903296ca9d571
SHA256: 23f8aa94ffb3c08a62735fe7fee5799880a8f322ce1d55ec49a13a3f85312db2
SSDEEP: 6144:f5yaXtrA/WSo1rl3ALrlHQpn0BwK3SBDmhYfFQC:fTX6WSofcZ+KCIGD
Ryun Ransomware Sample Download
Ryuk Ransomware WOL Sample Signatures
Family: Ransom:Win32/Ryuk.SB!MSR
MD5: 987336d00fdbec3bcdb95b078f7de46f
SHA256: a9643eb83d509ad4eac20a2a89d8571f8d781979ad078e89f5b75b4bcb16f65e
Ryuk Ransomware WOL Sample Download
Password of the archive is
infected.