General
-
Target
2024-05-13_0fbd575fe549fec1a3de9cf88ad79301_ryuk
-
Size
1.6MB
-
Sample
240513-njvjgadb85
-
MD5
0fbd575fe549fec1a3de9cf88ad79301
-
SHA1
a2d61bb9775c4e9c885a221756c0ebefd47c340f
-
SHA256
2a6a8203a401012a67db92ee17cdd9b4cb35b1c53c98d0aba02b484b6170c4dd
-
SHA512
d56a141ba8984063b76706d5b2a5bc544829f99743bc4e485959581e105262edb57e7ed4b6b6c9602eafa71d97265b0f9c50bdf7bdf202d8ba8ee9280f116e6e
-
SSDEEP
49152:uissRxPFuUC040ZaKMl9neRj6KIeVSc/zui+:H226K2c/ii+
Behavioral task
behavioral1
Sample
2024-05-13_0fbd575fe549fec1a3de9cf88ad79301_ryuk.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-05-13_0fbd575fe549fec1a3de9cf88ad79301_ryuk.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
10.99.99.64:4444
Targets
-
-
Target
2024-05-13_0fbd575fe549fec1a3de9cf88ad79301_ryuk
-
Size
1.6MB
-
MD5
0fbd575fe549fec1a3de9cf88ad79301
-
SHA1
a2d61bb9775c4e9c885a221756c0ebefd47c340f
-
SHA256
2a6a8203a401012a67db92ee17cdd9b4cb35b1c53c98d0aba02b484b6170c4dd
-
SHA512
d56a141ba8984063b76706d5b2a5bc544829f99743bc4e485959581e105262edb57e7ed4b6b6c9602eafa71d97265b0f9c50bdf7bdf202d8ba8ee9280f116e6e
-
SSDEEP
49152:uissRxPFuUC040ZaKMl9neRj6KIeVSc/zui+:H226K2c/ii+
Score1/10 -