Analysis

  • max time kernel
    134s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 21:48

General

  • Target

    2024-05-22_81c3d3ee340ee92d7a849a580196a550_cobalt-strike_ryuk.exe

  • Size

    796KB

  • MD5

    81c3d3ee340ee92d7a849a580196a550

  • SHA1

    b4a250bfe7cb434d8e7ee0e9fec6046b7b16e77e

  • SHA256

    2f0b23cbd88f6d8b94d84b87fc3347cb81baeb300442aa75031aeafbbd920925

  • SHA512

    59ca899219e4fd0463af7dfd4d2924f367b14e5b37c1b4b34f29e535ce2be573e82658097f0818ee331e89bf116c77c9bdd80e2c4e5a00712e83e9311ed31e14

  • SSDEEP

    24576:3ANw243tTduSZpUR0GHrVQ1aW4mSOgv3isi:3ew2upAHrVQ1/fSNvi

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-05-22_81c3d3ee340ee92d7a849a580196a550_cobalt-strike_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-05-22_81c3d3ee340ee92d7a849a580196a550_cobalt-strike_ryuk.exe"
    1⤵
      PID:4372

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4372-0-0x0000000140000000-0x00000001400CF000-memory.dmp

      Filesize

      828KB

    • memory/4372-8-0x0000000002D90000-0x0000000002DF0000-memory.dmp

      Filesize

      384KB

    • memory/4372-9-0x0000000002D90000-0x0000000002DF0000-memory.dmp

      Filesize

      384KB

    • memory/4372-1-0x0000000002D90000-0x0000000002DF0000-memory.dmp

      Filesize

      384KB

    • memory/4372-11-0x0000000140000000-0x00000001400CF000-memory.dmp

      Filesize

      828KB