General
-
Target
2024-09-21_655d9bd77ab0ba3f83ef6d366e8b6975_cobalt-strike_ryuk
-
Size
1.2MB
-
Sample
240921-bemlvaxhkp
-
MD5
655d9bd77ab0ba3f83ef6d366e8b6975
-
SHA1
8a6b5c8efb6132753b25240c72e3d669199a9db1
-
SHA256
dd06b10b693d906d5e9f5ef4cbf314e52244931e5dadd02b7c9af448882f1915
-
SHA512
b55d88ef796a860cf16ebf0a366925bef974209119730cbe89d154fc35cf47e48a9ee622914e018069758bc37d4a3cde04b3fbfebef13030e0a742bc8a5150b7
-
SSDEEP
24576:CGIe4yKQWSTGjDxRssN3Al8PHvf/r6LBNwiK1blyJs1jyWzNGIpqQmWr:CGIKKQDT0AsN3EOHcd2EJGjyEN/qM
Behavioral task
behavioral1
Sample
2024-09-21_655d9bd77ab0ba3f83ef6d366e8b6975_cobalt-strike_ryuk.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-21_655d9bd77ab0ba3f83ef6d366e8b6975_cobalt-strike_ryuk.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.131.129:4444
Targets
-
-
Target
2024-09-21_655d9bd77ab0ba3f83ef6d366e8b6975_cobalt-strike_ryuk
-
Size
1.2MB
-
MD5
655d9bd77ab0ba3f83ef6d366e8b6975
-
SHA1
8a6b5c8efb6132753b25240c72e3d669199a9db1
-
SHA256
dd06b10b693d906d5e9f5ef4cbf314e52244931e5dadd02b7c9af448882f1915
-
SHA512
b55d88ef796a860cf16ebf0a366925bef974209119730cbe89d154fc35cf47e48a9ee622914e018069758bc37d4a3cde04b3fbfebef13030e0a742bc8a5150b7
-
SSDEEP
24576:CGIe4yKQWSTGjDxRssN3Al8PHvf/r6LBNwiK1blyJs1jyWzNGIpqQmWr:CGIKKQDT0AsN3EOHcd2EJGjyEN/qM
Score1/10 -