General

  • Target

    2024-05-25_081b4c3dea06676cbccf2e826e99c2c1_cobalt-strike_ryuk

  • Size

    1.6MB

  • Sample

    240525-gflzlagc4x

  • MD5

    081b4c3dea06676cbccf2e826e99c2c1

  • SHA1

    8a5fbbceb624d76e47b32c0662cf25f159507172

  • SHA256

    7d3fa3a1b32dba41d0cf15824e3a088106ece48c263e86dcc499c44a849209fb

  • SHA512

    eb8e5a432f2e8ee8be37235ecf14b50f656995c6e6e6a783ef200bd492b6379100f2dfb1ffa33d401cdc1710ed46ae896e80bda623fdf96f92fd478239d893cc

  • SSDEEP

    49152:WvAjMNECBkLin//b9T7IalkbUjVb8YXDWTcAjRj6KIeVSc/zui+:WYIRoinbHlN7U6K2c/ii+

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

10.211.55.2:3333

Targets

    • Target

      2024-05-25_081b4c3dea06676cbccf2e826e99c2c1_cobalt-strike_ryuk

    • Size

      1.6MB

    • MD5

      081b4c3dea06676cbccf2e826e99c2c1

    • SHA1

      8a5fbbceb624d76e47b32c0662cf25f159507172

    • SHA256

      7d3fa3a1b32dba41d0cf15824e3a088106ece48c263e86dcc499c44a849209fb

    • SHA512

      eb8e5a432f2e8ee8be37235ecf14b50f656995c6e6e6a783ef200bd492b6379100f2dfb1ffa33d401cdc1710ed46ae896e80bda623fdf96f92fd478239d893cc

    • SSDEEP

      49152:WvAjMNECBkLin//b9T7IalkbUjVb8YXDWTcAjRj6KIeVSc/zui+:WYIRoinbHlN7U6K2c/ii+

    Score
    1/10

MITRE ATT&CK Matrix

Tasks