General

  • Target

    2024-07-26_298b93382db01428d89439c2bb8848ae_cobalt-strike_ryuk

  • Size

    973KB

  • MD5

    298b93382db01428d89439c2bb8848ae

  • SHA1

    b3aaaf3229b7d63685dc67bb36220609734574c0

  • SHA256

    f6ec70b597f75b36c027f9bf65fa6fe04910c4d73de4dddea77bbd64d2582352

  • SHA512

    cb43ebb9a8a2325d6b6ac82e4a403928bb3237b0344198da64d9f6ff0973ce7846e7a7cec214d49b6e31bf9d9909d4ea6226f1b8046e7ea01af2111359430706

  • SSDEEP

    24576:Ht5DOaoa1wJ0Y9gWjPgGM98uTSVa1cC8ESlLEZx+h6d:Ht5DLowwJR19G8kp12lExL

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

3.125.223.134:4444

Signatures

Files

  • 2024-07-26_298b93382db01428d89439c2bb8848ae_cobalt-strike_ryuk
    .exe windows:6 windows x64 arch:x64

    add361a4f3939af38d11873f1d74bded


    Code Sign

    Headers

    Imports

    Sections