General

  • Target

    2024-04-20_434dabb61e65d204dc5f58d4644268a2_ryuk

  • Size

    14.1MB

  • MD5

    434dabb61e65d204dc5f58d4644268a2

  • SHA1

    272494fe623e6a758759332e60a7db65e1f6256f

  • SHA256

    ed41ab01fc382c99563cc054a1bb39092eb88baf019446019cc798acee2346c7

  • SHA512

    1bb7d8467fe4b9134027199a0d51bd427650db4e65e8825f41104c529e298abbb99f979904f1b1eab1a1400201f919a622c375a3db8e106f9e17524f4174fe9d

  • SSDEEP

    98304:FaZ60e9b5OP+GtGK1AGTW5RE2HDw4DHtY8e+FLF4zRL3ASRmx3Sz7jD6kcD6EMJ4:QYa7oab/MCDSwzQ

Score
10/10

Malware Config

Signatures

  • Detects executables Discord URL observed in first stage droppers 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_434dabb61e65d204dc5f58d4644268a2_ryuk
    .exe windows:6 windows x64 arch:x64

    478cee0f4498fdaf5e9399d734bb15e3


    Headers

    Imports

    Sections