Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-06-2024 17:57

General

  • Target

    2024-06-01_408450bfb9718f94ed9319e3beba2f8e_cobalt-strike_ryuk.exe

  • Size

    796KB

  • MD5

    408450bfb9718f94ed9319e3beba2f8e

  • SHA1

    543608d56f4e3dbf8ddb043ff357e3df4532ee03

  • SHA256

    bf544137eb62cdffb4e8bdd2c7386ce7614df7c1585474670c0e68123222edb1

  • SHA512

    ef38a271d05a30548192c426872ce578faffe9a8575ccc483f7737367f6d82dd7ed7eb8dcde580ccae0cb693aba1a4398777d9b84ebe86ace8a07aaa3ca85693

  • SSDEEP

    12288:NXDCAZzP/w24lhsJlARaGdf1IrOrNhyRfLz707YH7lk9wl225CnPkKb5rdRYd:oANw243svoKFLgYHJWwl24C15rDY

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-01_408450bfb9718f94ed9319e3beba2f8e_cobalt-strike_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-01_408450bfb9718f94ed9319e3beba2f8e_cobalt-strike_ryuk.exe"
    1⤵
      PID:4072

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4072-6-0x0000000003570000-0x00000000035D0000-memory.dmp

      Filesize

      384KB

    • memory/4072-8-0x0000000140000000-0x00000001400CF000-memory.dmp

      Filesize

      828KB

    • memory/4072-9-0x0000000003570000-0x00000000035D0000-memory.dmp

      Filesize

      384KB

    • memory/4072-0-0x0000000003570000-0x00000000035D0000-memory.dmp

      Filesize

      384KB

    • memory/4072-12-0x0000000140000000-0x00000001400CF000-memory.dmp

      Filesize

      828KB