Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/08/2024, 17:23

General

  • Target

    2024-08-13_26b68e14088812c5b54ecf0e75cb1558_cobalt-strike_ryuk.exe

  • Size

    1.8MB

  • MD5

    26b68e14088812c5b54ecf0e75cb1558

  • SHA1

    88f4081dca81db38b096adcd09eb50b75d5e95d4

  • SHA256

    c9e7f6acca94eaa6c509df542057a2e5875bda6c7ae6f92018e7de08dfdc827c

  • SHA512

    ad698155873b2bdfc0c80c19b75d37abb2e9769380b64412ff5363c0457995c9f4d194f30b27d234d4b3f39881a79ff9977abc421f54198da2db46b5cdaa74dc

  • SSDEEP

    49152:PKX0DzOswXkfymHQlIuQc8FD5nb2LLPrFmRY:NXNOkfjqII8F1b6TwY

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-13_26b68e14088812c5b54ecf0e75cb1558_cobalt-strike_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-13_26b68e14088812c5b54ecf0e75cb1558_cobalt-strike_ryuk.exe"
    1⤵
      PID:3764

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/3764-0-0x0000000140000000-0x00000001401E8000-memory.dmp

            Filesize

            1.9MB

          • memory/3764-1-0x00000000020E0000-0x0000000002140000-memory.dmp

            Filesize

            384KB

          • memory/3764-7-0x00000000020E0000-0x0000000002140000-memory.dmp

            Filesize

            384KB

          • memory/3764-8-0x00000000020E0000-0x0000000002140000-memory.dmp

            Filesize

            384KB

          • memory/3764-10-0x00000000020E0000-0x0000000002140000-memory.dmp

            Filesize

            384KB

          • memory/3764-12-0x0000000140000000-0x00000001401E8000-memory.dmp

            Filesize

            1.9MB