General

  • Target

    2024-06-11_c9bbd9d6e16bda0913b856a8a2313d0c_cobalt-strike_ryuk

  • Size

    298KB

  • Sample

    240611-n3jlbawfnj

  • MD5

    c9bbd9d6e16bda0913b856a8a2313d0c

  • SHA1

    4516f6d7afe190092f60e60bad0c6fb07ef6e224

  • SHA256

    4a43a84fb4c628a9055adeab014f115be65e6511c4945d53bee2f4c93710bc68

  • SHA512

    edb6c9de0567646f55ebaa09a5f1a286ca04878abd0ec5b5e96cbca097b3b1578d6490bfb555414d47e8b313b23607bda0bab8de392c70880db74318b7606b59

  • SSDEEP

    6144:gbYZoHs9REuNMCbDpC+UCoR4pJ7olgtlhncEqIx7c7hRyA4yt:GYZoHs9RZeOd8024lhncf5Syt

Malware Config

Targets

    • Target

      2024-06-11_c9bbd9d6e16bda0913b856a8a2313d0c_cobalt-strike_ryuk

    • Size

      298KB

    • MD5

      c9bbd9d6e16bda0913b856a8a2313d0c

    • SHA1

      4516f6d7afe190092f60e60bad0c6fb07ef6e224

    • SHA256

      4a43a84fb4c628a9055adeab014f115be65e6511c4945d53bee2f4c93710bc68

    • SHA512

      edb6c9de0567646f55ebaa09a5f1a286ca04878abd0ec5b5e96cbca097b3b1578d6490bfb555414d47e8b313b23607bda0bab8de392c70880db74318b7606b59

    • SSDEEP

      6144:gbYZoHs9REuNMCbDpC+UCoR4pJ7olgtlhncEqIx7c7hRyA4yt:GYZoHs9RZeOd8024lhncf5Syt

    • Azov

      A wiper seeking only damage, first seen in 2022.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks