General
-
Target
2024-05-20_f3825b4d9196c0bd4bd664f74d9b60d0_ryuk
-
Size
1.6MB
-
Sample
240520-bbfdcscb43
-
MD5
f3825b4d9196c0bd4bd664f74d9b60d0
-
SHA1
004ddbb609cac5bc4150a72dc6d70729ae71ef8c
-
SHA256
533bb11f9a65dbaf506536b93ff9a3040d11f7c43b025a2264694871fd780c18
-
SHA512
bd6f56e094b5a5096e1813ca8236578d9518c38ddadf437f7800a4efc4b359d69fd07b6a07dc58be2d7b9dd6b2e75b64788dd23c3abff2b99377dbc73bad178a
-
SSDEEP
49152:6a8zFDlNQ8feImZXqweq2pNRj6KIeVSc/zui+:oFDlN3mZ6w/2p76K2c/ii+
Behavioral task
behavioral1
Sample
2024-05-20_f3825b4d9196c0bd4bd664f74d9b60d0_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-20_f3825b4d9196c0bd4bd664f74d9b60d0_ryuk.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Extracted
metasploit
windows/reverse_http
http://127.0.0.1:443/I1sQ9pXfmnmTkJKR9dmtkQtEiscC9OJlkl8IHEacWRLYrQyMsdCT8-uZvPHWhBEHo0vg-BlIhayQcOpthRsOzXaYytC-PE6_
Targets
-
-
Target
2024-05-20_f3825b4d9196c0bd4bd664f74d9b60d0_ryuk
-
Size
1.6MB
-
MD5
f3825b4d9196c0bd4bd664f74d9b60d0
-
SHA1
004ddbb609cac5bc4150a72dc6d70729ae71ef8c
-
SHA256
533bb11f9a65dbaf506536b93ff9a3040d11f7c43b025a2264694871fd780c18
-
SHA512
bd6f56e094b5a5096e1813ca8236578d9518c38ddadf437f7800a4efc4b359d69fd07b6a07dc58be2d7b9dd6b2e75b64788dd23c3abff2b99377dbc73bad178a
-
SSDEEP
49152:6a8zFDlNQ8feImZXqweq2pNRj6KIeVSc/zui+:oFDlN3mZ6w/2p76K2c/ii+
Score1/10 -