General

  • Target

    2024-08-25_59549cfb8acf2206b560cf0dd96efa04_cobalt-strike_ryuk

  • Size

    1.6MB

  • MD5

    59549cfb8acf2206b560cf0dd96efa04

  • SHA1

    5787d50b2ca8429f3234c65cb3203badefb89341

  • SHA256

    d24012fb0b0a78e59532bb3a49e72817605b91ef3ac55d76a3461f577848be99

  • SHA512

    01a947411d11a090d5658d1fede48c830718dccd68c2fcf2be27e5b9bafbc0af147d84bc31cf3eaf734ed39efc6f8dd87de45f168874d8c4b1919bda581b8373

  • SSDEEP

    49152:4/79ZhmiKDBxR4Y128Sjw60DCRj6KIeVSc/zui+:4J5KDUjd0Dq6K2c/ii+

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

10.211.55.2:3333

Signatures

Files

  • 2024-08-25_59549cfb8acf2206b560cf0dd96efa04_cobalt-strike_ryuk
    .exe windows:6 windows x64 arch:x64

    69573714e11441683ea863c40a1c0d54


    Code Sign

    Headers

    Imports

    Sections