Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 04:19

General

  • Target

    2024-09-08_74324cceab2e5f8e85676ad0ec16801c_cobalt-strike_ryuk.exe

  • Size

    1.4MB

  • MD5

    74324cceab2e5f8e85676ad0ec16801c

  • SHA1

    9e60f086148d9e0afc49cb8973bf4db1a40ec95c

  • SHA256

    34ffc3e1529bcdbda48f790e4e5edd9a451e76aadbad14ffa13bc6abc3207c6d

  • SHA512

    4778a816fbb234ee20b9076ec556bc2d3713f1d67d2e56e29e3ebf025f1e391c3bce10141bfda6da432feef6225bc6e726434cbbfa7fffcb785e68d60463e358

  • SSDEEP

    24576:ORz4A0VpLP7DmspWcY/0eaFsqjnhMgeiCl7G0nehbGZpbD:ORM3pr7qspHYQDmg27RnWGj

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-08_74324cceab2e5f8e85676ad0ec16801c_cobalt-strike_ryuk.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-08_74324cceab2e5f8e85676ad0ec16801c_cobalt-strike_ryuk.exe"
    1⤵
      PID:1636

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1636-0-0x0000000140000000-0x000000014016E000-memory.dmp

            Filesize

            1.4MB