General

  • Target

    2024-05-20_e5f77ec655f07714a8ad992311dc9836_hacktools_mimikatz_ryuk

  • Size

    1.4MB

  • MD5

    e5f77ec655f07714a8ad992311dc9836

  • SHA1

    dd1c91cec7316ef8ca0f882cec0d0bbd40738040

  • SHA256

    9ab68d7fb8b177a89541d61dc1bc0177e15b7e7bac9b9d90abac2a2ef2a7ac6c

  • SHA512

    2356f3a7ca9dadf95dd746d2ca04398bb5cea7e5b613b618c506f1597889b228894a04f3f4ac31b4f6dacb7294666d01ac37deac1e92bcaee7e01583bc867338

  • SSDEEP

    24576:U4psKU24aRFo0ONK58tiFfYE5fhYQpdx1RVHxiwRmdOt7blc83iIclVNM3:TM9sFhONc8c1YbMjRB8k7BcBIcC

Score
10/10

Malware Config

Signatures

  • Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs
  • Mimikatz family
  • mimikatz is an open source tool to dump credentials on Windows 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-20_e5f77ec655f07714a8ad992311dc9836_hacktools_mimikatz_ryuk
    .exe windows:5 windows x64 arch:x64

    26af692c9ef954441cc98c91195d6871


    Headers

    Imports

    Sections