General

  • Target

    2024-02-01_9ee14ebe300b2d22c6c31415a33b4d3c_ryuk

  • Size

    924KB

  • MD5

    9ee14ebe300b2d22c6c31415a33b4d3c

  • SHA1

    04ef1f38c6e770797517227390a7abc4bd5ec042

  • SHA256

    29e17028519d34eca7e888e5b07cfa44424c36c5267a39f451b17fd52df66fe0

  • SHA512

    d975e005ef75bc8c53f734799a45bfae1874e2d60b863171fbd1ec180d2ab32506ead91bf0244b84ddbc4ceb7393dc0dbbf0c5806d2901e9632d20db8f44bed8

  • SSDEEP

    24576:cbdMhKVDn2RS9UC6mVGRWfmOCQBTwKee6Yy:hRS9xhIV+Toe6

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

136.36.87.125:12756

Signatures

  • Metasploit family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-01_9ee14ebe300b2d22c6c31415a33b4d3c_ryuk
    .exe windows:6 windows x64 arch:x64

    91c272778494f545a220f3e427777252


    Headers

    Imports

    Sections