General

  • Target

    2024-06-07_1c774f341de9890d7bfb7da0e723cc3a_ryuk

  • Size

    11.3MB

  • MD5

    1c774f341de9890d7bfb7da0e723cc3a

  • SHA1

    54ce3b14b5dbf966d98bd2b874c184f06a013327

  • SHA256

    608fe438cba1089b96fe0eba14f476f9d1fc5e4cd0d6d90c0d6d5bed7cfa8886

  • SHA512

    30e75d41c38afaa6f822789ebaf57b174211ec5339113c19cbfcb276ca1c9b97c40bce5fff43c27f5753804708ccf5e3afce76f915f1d396f495ddb8b073e983

  • SSDEEP

    196608:0c3fyrODpFC4g0AVIGvB8ZJ9BIBxIFoufm48RmU/3ZlsPvmuPin58CNUHsjfUsQe:lbLgtIG4YXIfutN3ZWLKnqv

Score
10/10

Malware Config

Signatures

  • Detects executables referencing Discord tokens regular expressions 1 IoCs
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-07_1c774f341de9890d7bfb7da0e723cc3a_ryuk
    .exe windows:5 windows x64 arch:x64

    7aa1951517b3b8d38b12f874b66196c9


    Headers

    Imports

    Sections

  • NitroGenerator.pyc