General
-
Target
2024-05-14_168fd9e50077e370c1427038445b2966_ryuk
-
Size
1.6MB
-
Sample
240514-ea9scsaa59
-
MD5
168fd9e50077e370c1427038445b2966
-
SHA1
cdfffd7e4efaddcae8d411b6e855764d006a3303
-
SHA256
2d78e9f8235ea7942f5ac982895328ca4172a7251f8891a532f1e68e28fba235
-
SHA512
090e1a493c6249a25da04d0012c454a61ac5e5a630d3ea3301d92c438630f71ef8e21214b471de698215f68bf301bd300cb2a68d9db2f2cb18d71c9dc58d8bb7
-
SSDEEP
49152:K3C3c4KVSEetEcJYJ5nYimVRj6KIeVSc/zui+:U7SXiYYGD6K2c/ii+
Behavioral task
behavioral1
Sample
2024-05-14_168fd9e50077e370c1427038445b2966_ryuk.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-14_168fd9e50077e370c1427038445b2966_ryuk.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
10.99.99.93:4444
Targets
-
-
Target
2024-05-14_168fd9e50077e370c1427038445b2966_ryuk
-
Size
1.6MB
-
MD5
168fd9e50077e370c1427038445b2966
-
SHA1
cdfffd7e4efaddcae8d411b6e855764d006a3303
-
SHA256
2d78e9f8235ea7942f5ac982895328ca4172a7251f8891a532f1e68e28fba235
-
SHA512
090e1a493c6249a25da04d0012c454a61ac5e5a630d3ea3301d92c438630f71ef8e21214b471de698215f68bf301bd300cb2a68d9db2f2cb18d71c9dc58d8bb7
-
SSDEEP
49152:K3C3c4KVSEetEcJYJ5nYimVRj6KIeVSc/zui+:U7SXiYYGD6K2c/ii+
Score1/10 -