General

  • Target

    2024-08-06_10a44da4a5e67e6e40646590cb0bbbaf_cobalt-strike_hijackloader_ryuk

  • Size

    12.6MB

  • MD5

    10a44da4a5e67e6e40646590cb0bbbaf

  • SHA1

    d73a0dae601df66268ff78ed6b1a5b4b2ea7f024

  • SHA256

    7967bfb987b5488aee58701dd96f8261c9ea8e16f66afd726753f51e217bacaf

  • SHA512

    fbd558f52974d575052e0e9571bc1cc7e2912ff0beaf86627ea1639b0e7de15702037298aaab0537fd0130a847bac23e10d6d38a400aea564c1e3718c92bd7f5

  • SSDEEP

    196608:9Ln8SiCGurDz5o/VP7TyT8xw3y0Kl2OCxnSBVQBWG:9b78urDz5o/xT1wi0U2bnB

Score
3/10

Malware Config

Signatures

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-08-06_10a44da4a5e67e6e40646590cb0bbbaf_cobalt-strike_hijackloader_ryuk
    .exe windows:5 windows x64 arch:x64

    15b0d359b0d004363a1c9a125be29113


    Headers

    Imports

    Exports

    Sections