Static task
static1
Behavioral task
behavioral1
Sample
2024-02-01_c478a15acb0b83c9b6395a80e6683fb4_cobalt-strike_ryuk.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-01_c478a15acb0b83c9b6395a80e6683fb4_cobalt-strike_ryuk.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-02-01_c478a15acb0b83c9b6395a80e6683fb4_cobalt-strike_ryuk
-
Size
301KB
-
MD5
c478a15acb0b83c9b6395a80e6683fb4
-
SHA1
220e568597fe6afb451149ca592b6f9c1c24530a
-
SHA256
449455d535c5436ff04540655c09243b98f5192f47d6048fb0a588441b6f2d10
-
SHA512
74d8857d59e9faa5eff9175cd65c16cc79e47702266106e4d81683e870409f0c997113589bd6730d501fda8309048b0e3f44ee9f60a511ad57ffa653fc76e90c
-
SSDEEP
6144:jBVQDogNAcjkmUHV68F7wW64U45zQ+1ooZJHvXCj73i43Npk0RqSPZpM4KiUaFgo:qogNAcjkmUHV68F7wW64U45zd1ooZU7b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-02-01_c478a15acb0b83c9b6395a80e6683fb4_cobalt-strike_ryuk
Files
-
2024-02-01_c478a15acb0b83c9b6395a80e6683fb4_cobalt-strike_ryuk.exe windows:6 windows x64 arch:x64
76a742be8a5ee218e41d97cf9234e90e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
CryptAcquireContextA
CryptCreateHash
CryptDecrypt
CryptDeriveKey
CryptDestroyHash
CryptDestroyKey
CryptHashData
CryptReleaseContext
GetUserNameA
RegCreateKeyExA
RegQueryValueExA
kernel32
CloseHandle
CompareStringW
CreateFileMappingW
CreateFileW
CreateMutexA
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileExW
FindNextFileW
FindResourceA
FlushFileBuffers
FlushInstructionCache
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsW
GetFileType
GetLastError
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
InitializeSListHead
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
LCMapStringW
LeaveCriticalSection
LoadLibraryExW
LoadLibraryW
LoadResource
LockResource
MapViewOfFile
MultiByteToWideChar
OutputDebugStringA
QueryPerformanceCounter
RaiseException
RtlCaptureContext
RtlLookupFunctionEntry
RtlPcToFileHeader
RtlUnwindEx
RtlVirtualUnwind
SetEnvironmentVariableW
SetFilePointerEx
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
SizeofResource
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualProtect
WideCharToMultiByte
WriteConsoleW
WriteFile
lstrcmpA
user32
wsprintfA
wininet
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
Sections
.text Size: 238KB - Virtual size: 238KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 40B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gehcont Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.voltbl Size: 512B - Virtual size: 42B
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ