General

  • Target

    2024-08-12_3d71b0f5652350e26d1042b63adac7e8_cobalt-strike_hijackloader_ryuk

  • Size

    1011KB

  • MD5

    3d71b0f5652350e26d1042b63adac7e8

  • SHA1

    92c316869e00cbc5541b0aa0af8b9b45111d0484

  • SHA256

    dde42950d756198392acdaaa692fdf19947adfee80113b09aef1ceb8f490e4b1

  • SHA512

    404a6e32a012a64d0e35213e247881bca8260b27de0dc7e34985636dacd2e623e6046864daa63e75aa355e8cf9eba5b3b94be0b9fed433d6111e9a5554643d78

  • SSDEEP

    24576:oNlWLtJaEVOvNxiT6wJe85TfZKhfqLxB:oNlWLTa9vNxlwJ/5bZKhgx

Score
3/10

Malware Config

Signatures

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-08-12_3d71b0f5652350e26d1042b63adac7e8_cobalt-strike_hijackloader_ryuk
    .exe windows:5 windows x64 arch:x64

    35e25c87477ab37476e6191c3000ab33


    Headers

    Imports

    Exports

    Sections