General
-
Target
2024-05-25_081b4c3dea06676cbccf2e826e99c2c1_cobalt-strike_ryuk
-
Size
1.6MB
-
Sample
240525-gflzlagc4x
-
MD5
081b4c3dea06676cbccf2e826e99c2c1
-
SHA1
8a5fbbceb624d76e47b32c0662cf25f159507172
-
SHA256
7d3fa3a1b32dba41d0cf15824e3a088106ece48c263e86dcc499c44a849209fb
-
SHA512
eb8e5a432f2e8ee8be37235ecf14b50f656995c6e6e6a783ef200bd492b6379100f2dfb1ffa33d401cdc1710ed46ae896e80bda623fdf96f92fd478239d893cc
-
SSDEEP
49152:WvAjMNECBkLin//b9T7IalkbUjVb8YXDWTcAjRj6KIeVSc/zui+:WYIRoinbHlN7U6K2c/ii+
Behavioral task
behavioral1
Sample
2024-05-25_081b4c3dea06676cbccf2e826e99c2c1_cobalt-strike_ryuk.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-25_081b4c3dea06676cbccf2e826e99c2c1_cobalt-strike_ryuk.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
metasploit
windows/reverse_tcp
10.211.55.2:3333
Targets
-
-
Target
2024-05-25_081b4c3dea06676cbccf2e826e99c2c1_cobalt-strike_ryuk
-
Size
1.6MB
-
MD5
081b4c3dea06676cbccf2e826e99c2c1
-
SHA1
8a5fbbceb624d76e47b32c0662cf25f159507172
-
SHA256
7d3fa3a1b32dba41d0cf15824e3a088106ece48c263e86dcc499c44a849209fb
-
SHA512
eb8e5a432f2e8ee8be37235ecf14b50f656995c6e6e6a783ef200bd492b6379100f2dfb1ffa33d401cdc1710ed46ae896e80bda623fdf96f92fd478239d893cc
-
SSDEEP
49152:WvAjMNECBkLin//b9T7IalkbUjVb8YXDWTcAjRj6KIeVSc/zui+:WYIRoinbHlN7U6K2c/ii+
Score1/10 -