General
-
Target
2024-05-24_6c1cee4c032d7634966239c0377a1ba7_ryuk
-
Size
1.6MB
-
Sample
240524-bxc55agc9z
-
MD5
6c1cee4c032d7634966239c0377a1ba7
-
SHA1
4f93f2b24406fd02fa2c8926051e017dfcbbb5f2
-
SHA256
899f048ca8b0048ae3ae681cbf44c7cee8caed5c67539145378b127d32843b3a
-
SHA512
84ea6f977e1eee934809ba923ac9b6bccafc84c72530ee67b210d45f0e59a78d3387ad970188c46e2b3aebee99cf3a4df10509ca280aa0f1475f6141c4195a03
-
SSDEEP
49152:v5vC1XMH3frfb04AtRcAwRj6KIeVSc/zui+:5j4Tcp6K2c/ii+
Behavioral task
behavioral1
Sample
2024-05-24_6c1cee4c032d7634966239c0377a1ba7_ryuk.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-24_6c1cee4c032d7634966239c0377a1ba7_ryuk.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
192.168.1.10:443
Targets
-
-
Target
2024-05-24_6c1cee4c032d7634966239c0377a1ba7_ryuk
-
Size
1.6MB
-
MD5
6c1cee4c032d7634966239c0377a1ba7
-
SHA1
4f93f2b24406fd02fa2c8926051e017dfcbbb5f2
-
SHA256
899f048ca8b0048ae3ae681cbf44c7cee8caed5c67539145378b127d32843b3a
-
SHA512
84ea6f977e1eee934809ba923ac9b6bccafc84c72530ee67b210d45f0e59a78d3387ad970188c46e2b3aebee99cf3a4df10509ca280aa0f1475f6141c4195a03
-
SSDEEP
49152:v5vC1XMH3frfb04AtRcAwRj6KIeVSc/zui+:5j4Tcp6K2c/ii+
Score1/10 -