General

  • Target

    2024-05-23_900e86eef45cc54729e657012bf142a1_cobalt-strike_ryuk

  • Size

    925KB

  • MD5

    900e86eef45cc54729e657012bf142a1

  • SHA1

    3c5507a51ea0fabc60a1a50d0ce11f820903698b

  • SHA256

    d21e7321b3014ddfa53b2b5bd123faaaf43c8862ec531fafc68591e466dbd9b3

  • SHA512

    5d76a85c0b0c0defa01b3a562b3c5447b5c95c01cd50b248939521f7a10c2b0d768037b8bc79ba7050b41dc72225e389916e77bfe7565bb8d084cc2aeafee3b5

  • SSDEEP

    24576:TnQzZB80Dx+4lkn8O4ZukrsvAdVHwEQiMX:UFB8Qx+4lgP4ZuCsvA/HwXf

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

127.0.0.1:4444

Signatures

Files

  • 2024-05-23_900e86eef45cc54729e657012bf142a1_cobalt-strike_ryuk
    .exe windows:6 windows x64 arch:x64

    13235f12bec0089819abb93d2e545004


    Code Sign

    Headers

    Imports

    Sections