General

  • Target

    2024-02-03_4f56e41f2bf04562f66ea8a0a75ef78f_ryuk

  • Size

    924KB

  • MD5

    4f56e41f2bf04562f66ea8a0a75ef78f

  • SHA1

    9064f271af125f31e3ea2aeab0d22dce057a64e9

  • SHA256

    77c289a56fd18af77c1f156c7f73b3e636dae79f31c9c01dd8542f264e5d8c1b

  • SHA512

    eb9a1bb01f07c84ecd2a55370cf844f4dab44ec43417589272ed9c186fb367021cdb00be7eb22364ea46c4afe104674da35d7c873012206a7ed3fcec68939364

  • SSDEEP

    12288:xHtUwxcNigLuXkmTyRg8jVN1gvF83fgkq3weeim0dSlSgKiTwKee6YHS:LSi2LmTEjVfegYx3KLlSiTwKee6Yy

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Signatures

  • Metasploit family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-03_4f56e41f2bf04562f66ea8a0a75ef78f_ryuk
    .exe windows:6 windows x64 arch:x64

    91c272778494f545a220f3e427777252


    Headers

    Imports

    Sections