Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
25-04-2024 20:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-25_22527af9403af6d2cae89d7f066057bb_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-25_22527af9403af6d2cae89d7f066057bb_ryuk.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-25_22527af9403af6d2cae89d7f066057bb_ryuk.exe
-
Size
115KB
-
MD5
22527af9403af6d2cae89d7f066057bb
-
SHA1
45db7cbc3a31dda3aa5dc4f9e3b2f57d27c64459
-
SHA256
15149b0fa15fe27b6cafc0088080b67ad2125eeafb29d0fe0dc9f819d694c1c3
-
SHA512
71a080cc9821482d09898776d1f515763434306dbe67a04d1db5e4209e49af1778a16be123fbf2986dc1a22ce2de897dd71903f287b55cd73891dd6c637596f6
-
SSDEEP
3072:LGbabld/rR5m334fRXvpunxklQHQAxcVJ0fs:LGba7/rHVfJvpluw
Malware Config
Extracted
cobaltstrike
http://47.97.41.107:443/static/js/libs/masonry.pkgd.min.js
-
user_agent
Accept: */* Accept-Language: en-US,en;q=0.9 Referer: https://www.python.org/ Accept-Encoding: gzip, deflate, br User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.140 Safari/537.36
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3972-0-0x0000026426A60000-0x0000026426A61000-memory.dmpFilesize
4KB