Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-04-2024 04:52
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-23_9c7e066847774733ce942e9c1175bf10_cobalt-strike_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-23_9c7e066847774733ce942e9c1175bf10_cobalt-strike_ryuk.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-23_9c7e066847774733ce942e9c1175bf10_cobalt-strike_ryuk.exe
-
Size
381KB
-
MD5
9c7e066847774733ce942e9c1175bf10
-
SHA1
1a916ddc848db5a06616e392acab92665fa9c04d
-
SHA256
485acc6a044dbb0108e343d8144bceb4f64a82e2f079c81f199f55be4dcc294f
-
SHA512
fbc8136b33f7ac69a1734c62006fa123eaaa3771e0d1c3647e46f45790a75a915dabf61d1e298afd2c49db332276d578a1347594a79e261afa2b7781a1e8428b
-
SSDEEP
6144:TmVdviXhtU2HmauRdwB2IsW7KczfvciQLAP157CB7gFQ:TmV5iXhtNHmauRd0BsWOAP
Malware Config
Extracted
cobaltstrike
http://192.168.200.140:80/4Bur
-
user_agent
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUSMSE)
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2088-0-0x0000000000050000-0x0000000000051000-memory.dmpFilesize
4KB