General
-
Target
2024-08-20_ed0011fc0bc8b37fb60ccf227a2010da_cobalt-strike_hijackloader_ryuk
-
Size
1.5MB
-
Sample
240820-xecyas1fqr
-
MD5
ed0011fc0bc8b37fb60ccf227a2010da
-
SHA1
356d7b2365f72c914eda5150c8dac3836a4ccfdc
-
SHA256
00a43334224f7aa02a7e3386c8edc4ccc51a1f71a49f43705ac9fd36072e20c4
-
SHA512
5cea0f988b6c7dc7cff1604fd70044dd7609564fd7b5063d36b1132dac2877db160c885c25f2f5a8b4f93a06043ba56803f268bb183c24db63b38811a8d7fd58
-
SSDEEP
24576:MkQ/UbxuNwMA2bdbXlgmYBdDiNFo/2UCTFM8hpSyOxhQI:MkSsxmAQbXlgjdmNFo/2PTjhpT8V
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-20_ed0011fc0bc8b37fb60ccf227a2010da_cobalt-strike_hijackloader_ryuk.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
2024-08-20_ed0011fc0bc8b37fb60ccf227a2010da_cobalt-strike_hijackloader_ryuk
-
Size
1.5MB
-
MD5
ed0011fc0bc8b37fb60ccf227a2010da
-
SHA1
356d7b2365f72c914eda5150c8dac3836a4ccfdc
-
SHA256
00a43334224f7aa02a7e3386c8edc4ccc51a1f71a49f43705ac9fd36072e20c4
-
SHA512
5cea0f988b6c7dc7cff1604fd70044dd7609564fd7b5063d36b1132dac2877db160c885c25f2f5a8b4f93a06043ba56803f268bb183c24db63b38811a8d7fd58
-
SSDEEP
24576:MkQ/UbxuNwMA2bdbXlgmYBdDiNFo/2UCTFM8hpSyOxhQI:MkSsxmAQbXlgjdmNFo/2PTjhpT8V
Score1/10 -