General
-
Target
2024-08-22_78d10a0d8097e7238811efb5b677d006_cobalt-strike_hijackloader_ryuk
-
Size
1.0MB
-
Sample
240822-lhjdpszake
-
MD5
78d10a0d8097e7238811efb5b677d006
-
SHA1
4d77ccc11034ca6390583a78f71fc2bfbe5f7e4f
-
SHA256
d768d74a0f6084b870771de2f20b6a53fd861b24825d7bc5e3572932806ba286
-
SHA512
2b8f94c7dc57043fa463d545407b6c6c7be491105e3360cc35d5f48ed4f7aaf046ab6e1a7ac9e5e1c935ee00228c9f84f07f2f39cd1da17a150ebfdc2aedab54
-
SSDEEP
12288:2Rd9OF1l9NMHDqI7VtG4eblRO0W+wDb5FdWXHaJfVyI/JhTaoq2eoRZIW:PFxNMHDqeVY/O0vETWXjCO9KZIW
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-22_78d10a0d8097e7238811efb5b677d006_cobalt-strike_hijackloader_ryuk.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
2024-08-22_78d10a0d8097e7238811efb5b677d006_cobalt-strike_hijackloader_ryuk
-
Size
1.0MB
-
MD5
78d10a0d8097e7238811efb5b677d006
-
SHA1
4d77ccc11034ca6390583a78f71fc2bfbe5f7e4f
-
SHA256
d768d74a0f6084b870771de2f20b6a53fd861b24825d7bc5e3572932806ba286
-
SHA512
2b8f94c7dc57043fa463d545407b6c6c7be491105e3360cc35d5f48ed4f7aaf046ab6e1a7ac9e5e1c935ee00228c9f84f07f2f39cd1da17a150ebfdc2aedab54
-
SSDEEP
12288:2Rd9OF1l9NMHDqI7VtG4eblRO0W+wDb5FdWXHaJfVyI/JhTaoq2eoRZIW:PFxNMHDqeVY/O0vETWXjCO9KZIW
Score1/10 -