General

  • Target

    2024-02-01_245abcfffab55f71741d42ba410704ce_ryuk

  • Size

    924KB

  • MD5

    245abcfffab55f71741d42ba410704ce

  • SHA1

    fb51a145a11a197a5f6d36f2d8ce42195c3e600d

  • SHA256

    11ba907503ece11ce8042813890515c4cbceacdfe2f6d535c7c3e1f6e786e303

  • SHA512

    1aba81d749ab982627f6507ab153cdfa40650ad1abb7ef6216dadc8a2fc47d20505d046ce231cd65bd6bd0cbb2aea08f1f5d64852cba455c9a845ffe1ad657fd

  • SSDEEP

    24576:8T1Jrxt5gI2LjmlnU21SR+ciPbmTwKee6Yy:8T1XtONLjmVU2QYchToe6

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

161.108.255.202:60026

Signatures

  • Metasploit family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-01_245abcfffab55f71741d42ba410704ce_ryuk
    .exe windows:6 windows x64 arch:x64

    91c272778494f545a220f3e427777252


    Headers

    Imports

    Sections