General
-
Target
2024-04-25_871074d46d7e27838ff7ce2559e8e0d6_cobalt-strike_ryuk
-
Size
1.2MB
-
Sample
240425-mpyyeaaa22
-
MD5
871074d46d7e27838ff7ce2559e8e0d6
-
SHA1
ce5165bf103fe85ffce715df159d051303c606f0
-
SHA256
ebbcbf480ab03a0a5bdc123574720b16f835f641534fc94783e006cf196c8193
-
SHA512
6bafe67f755d8b14d6b1278d6d2d5dec31c3bd6c0325645d0fff1f2591bde617b19dd5c746e2dc5f1a26257e3b24a46e1d8a410adb114679e9ae980d85634a0c
-
SSDEEP
24576:+wIEES7sjM23EQVdEDvLJPjraFLR5ROwwC:+rE/7MM23Xajrkp/
Behavioral task
behavioral1
Sample
2024-04-25_871074d46d7e27838ff7ce2559e8e0d6_cobalt-strike_ryuk.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-25_871074d46d7e27838ff7ce2559e8e0d6_cobalt-strike_ryuk.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.1.101:4444
Targets
-
-
Target
2024-04-25_871074d46d7e27838ff7ce2559e8e0d6_cobalt-strike_ryuk
-
Size
1.2MB
-
MD5
871074d46d7e27838ff7ce2559e8e0d6
-
SHA1
ce5165bf103fe85ffce715df159d051303c606f0
-
SHA256
ebbcbf480ab03a0a5bdc123574720b16f835f641534fc94783e006cf196c8193
-
SHA512
6bafe67f755d8b14d6b1278d6d2d5dec31c3bd6c0325645d0fff1f2591bde617b19dd5c746e2dc5f1a26257e3b24a46e1d8a410adb114679e9ae980d85634a0c
-
SSDEEP
24576:+wIEES7sjM23EQVdEDvLJPjraFLR5ROwwC:+rE/7MM23Xajrkp/
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-