General
-
Target
2024-05-15_6cd768e05a3d5b1641f0d6716abd23cb_ryuk
-
Size
1.2MB
-
Sample
240515-ccdrlabf4t
-
MD5
6cd768e05a3d5b1641f0d6716abd23cb
-
SHA1
1a94deace2584783fe833bc8d57d6576afb05791
-
SHA256
b24ed0873df52d767edc84fb7b7824ed4bf51b06b67e06819c19cee314fd5fea
-
SHA512
700813cf16c9a6af1906ea62355bbd058a229060de61f9989c694aba132bd884c7f574f8155b46cdbcfba6c8598e231033e380c0e99c9a0a73bd17d538399b61
-
SSDEEP
24576:TOGyAV7Rg3aGj3L9yFrBHOT97mrPb39l16CXqlVpwwJg6rtYvonWXsT:TOGyAVdg3ay3xuNHPJTX0wwJgAUyWg
Behavioral task
behavioral1
Sample
2024-05-15_6cd768e05a3d5b1641f0d6716abd23cb_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-15_6cd768e05a3d5b1641f0d6716abd23cb_ryuk.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
192.168.0.30:443
Targets
-
-
Target
2024-05-15_6cd768e05a3d5b1641f0d6716abd23cb_ryuk
-
Size
1.2MB
-
MD5
6cd768e05a3d5b1641f0d6716abd23cb
-
SHA1
1a94deace2584783fe833bc8d57d6576afb05791
-
SHA256
b24ed0873df52d767edc84fb7b7824ed4bf51b06b67e06819c19cee314fd5fea
-
SHA512
700813cf16c9a6af1906ea62355bbd058a229060de61f9989c694aba132bd884c7f574f8155b46cdbcfba6c8598e231033e380c0e99c9a0a73bd17d538399b61
-
SSDEEP
24576:TOGyAV7Rg3aGj3L9yFrBHOT97mrPb39l16CXqlVpwwJg6rtYvonWXsT:TOGyAVdg3ay3xuNHPJTX0wwJgAUyWg
Score1/10 -