General

  • Target

    2024-05-25_081b4c3dea06676cbccf2e826e99c2c1_cobalt-strike_ryuk

  • Size

    1.6MB

  • MD5

    081b4c3dea06676cbccf2e826e99c2c1

  • SHA1

    8a5fbbceb624d76e47b32c0662cf25f159507172

  • SHA256

    7d3fa3a1b32dba41d0cf15824e3a088106ece48c263e86dcc499c44a849209fb

  • SHA512

    eb8e5a432f2e8ee8be37235ecf14b50f656995c6e6e6a783ef200bd492b6379100f2dfb1ffa33d401cdc1710ed46ae896e80bda623fdf96f92fd478239d893cc

  • SSDEEP

    49152:WvAjMNECBkLin//b9T7IalkbUjVb8YXDWTcAjRj6KIeVSc/zui+:WYIRoinbHlN7U6K2c/ii+

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

10.211.55.2:3333

Signatures

Files

  • 2024-05-25_081b4c3dea06676cbccf2e826e99c2c1_cobalt-strike_ryuk
    .exe windows:6 windows x64 arch:x64

    69573714e11441683ea863c40a1c0d54


    Code Sign

    Headers

    Imports

    Sections