General

  • Target

    2024-07-06_e84751dd268bca6c97ad550e56b588f2_cobalt-strike_ryuk

  • Size

    1.6MB

  • MD5

    e84751dd268bca6c97ad550e56b588f2

  • SHA1

    5dd47d42c040c107b8475be55397f29cedc0a750

  • SHA256

    c87cf06182aacc6b13baeb1c3dcfb5b7e7ccd875095273daf431079b6db7769a

  • SHA512

    0713e5dac682846efe859253edd4f72b432f9df96a5d3d1dbfd8a5671f65840601385e26325d350ae265ffab7d8f0b55a2780502318d81389dda1bdfce05651f

  • SSDEEP

    49152:O40GTZze4IT59/ja1zkppS7vQ3fMXRj6KIeVSc/zui+:OtBDaQU96K2c/ii+

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

10.0.2.15:4444

Signatures

Files

  • 2024-07-06_e84751dd268bca6c97ad550e56b588f2_cobalt-strike_ryuk
    .exe windows:6 windows x64 arch:x64

    69573714e11441683ea863c40a1c0d54


    Code Sign

    Headers

    Imports

    Sections