General

  • Target

    2024-08-07_cd3ff67925dd7c9dc8c2e2f01aaface4_cobalt-strike_ryuk

  • Size

    973KB

  • MD5

    cd3ff67925dd7c9dc8c2e2f01aaface4

  • SHA1

    8fe51b0b9dd5a4e42100e3c5540fc22d39bd7ad2

  • SHA256

    fd3733372507e5aac89ca6b5ffd2580791570e4740b3c570d5c29dbd22060515

  • SHA512

    73fa65b448732c997ba07e9035fe2b036ef247844bbebb5c9ad0594be5598a6a11c16d483800531d7e91bd44faf459686a2e64952549651d817cfa14b077cfa4

  • SSDEEP

    24576:3bahIjhI3SyykK+gPqtWyXwyuygWbiBeJLa3RZEppc66OIO:rPjh1RugitWqpuypACuBt66

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

127.0.0.1:445

Signatures

Files

  • 2024-08-07_cd3ff67925dd7c9dc8c2e2f01aaface4_cobalt-strike_ryuk
    .exe windows:6 windows x64 arch:x64

    acc4c8794a0a85da871307b47dd9a48c


    Code Sign

    Headers

    Imports

    Sections