General

  • Target

    2024-01-18_9100c8558ce951105cdaed4520de2260_pos_ryuk

  • Size

    28.0MB

  • MD5

    9100c8558ce951105cdaed4520de2260

  • SHA1

    a0f3a44407df72830521a02383be6a4196c35d90

  • SHA256

    4fbb27593da5ab4396e5fb14a4bc85ecfbc8021f50d47529919e481e83bed599

  • SHA512

    f5c1ed151d3184d49465d364635734860b1c6167714616fdaa7406ef5e5b6ecd7ab139affb9dc969371a3e8b0ce6e09e8f78d5e4ac37d8a0928dd7cd48011780

  • SSDEEP

    393216:3wKc0igbSHDGhAriW1CPwDv3uFhtU2lvz0dSR1+jqc+n:3Zc0iC3Tb5

Score
10/10

Malware Config

Signatures

  • Detects executables Discord URL observed in first stage droppers 1 IoCs
  • Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-18_9100c8558ce951105cdaed4520de2260_pos_ryuk
    .exe windows:6 windows x64 arch:x64

    7bcd408d6b44236bebf6039337399cf4


    Headers

    Imports

    Sections