General
-
Target
2024-05-24_9e44c504df85d80152b72738d0a88b2b_ryuk
-
Size
1.6MB
-
Sample
240524-b1fenage61
-
MD5
9e44c504df85d80152b72738d0a88b2b
-
SHA1
fb21b3afacfa9862ed5381eeaa38dcf216784cdd
-
SHA256
cd7f749817770b845a77df82b5b8a98884c454130a986620fcbfd66f2fc05084
-
SHA512
41f3a1d7c8493f1f8be28ba6d362c7fbfa4d264a920c57ce0febb62d2e61bf3149fdd58faffcd7ff51594c2d954f37df25275537f60213820cc44e5b3be5ad80
-
SSDEEP
49152:m5+fTXpnh9Q/I6XRgzDlVYY3yPdIbRj6KIeVSc/zui+:CgUSd+dIJ6K2c/ii+
Behavioral task
behavioral1
Sample
2024-05-24_9e44c504df85d80152b72738d0a88b2b_ryuk.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-24_9e44c504df85d80152b72738d0a88b2b_ryuk.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
192.168.1.10:4444
Targets
-
-
Target
2024-05-24_9e44c504df85d80152b72738d0a88b2b_ryuk
-
Size
1.6MB
-
MD5
9e44c504df85d80152b72738d0a88b2b
-
SHA1
fb21b3afacfa9862ed5381eeaa38dcf216784cdd
-
SHA256
cd7f749817770b845a77df82b5b8a98884c454130a986620fcbfd66f2fc05084
-
SHA512
41f3a1d7c8493f1f8be28ba6d362c7fbfa4d264a920c57ce0febb62d2e61bf3149fdd58faffcd7ff51594c2d954f37df25275537f60213820cc44e5b3be5ad80
-
SSDEEP
49152:m5+fTXpnh9Q/I6XRgzDlVYY3yPdIbRj6KIeVSc/zui+:CgUSd+dIJ6K2c/ii+
Score1/10 -