General

  • Target

    2024-05-14_168fd9e50077e370c1427038445b2966_ryuk

  • Size

    1.6MB

  • MD5

    168fd9e50077e370c1427038445b2966

  • SHA1

    cdfffd7e4efaddcae8d411b6e855764d006a3303

  • SHA256

    2d78e9f8235ea7942f5ac982895328ca4172a7251f8891a532f1e68e28fba235

  • SHA512

    090e1a493c6249a25da04d0012c454a61ac5e5a630d3ea3301d92c438630f71ef8e21214b471de698215f68bf301bd300cb2a68d9db2f2cb18d71c9dc58d8bb7

  • SSDEEP

    49152:K3C3c4KVSEetEcJYJ5nYimVRj6KIeVSc/zui+:U7SXiYYGD6K2c/ii+

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

10.99.99.93:4444

Signatures

Files

  • 2024-05-14_168fd9e50077e370c1427038445b2966_ryuk
    .exe windows:6 windows x64 arch:x64

    69573714e11441683ea863c40a1c0d54


    Code Sign

    Headers

    Imports

    Sections