General

  • Target

    2024-09-21_ee9fa748e01c65b519926a27ad8b7f4f_cobalt-strike_hijackloader_ryuk

  • Size

    14.9MB

  • MD5

    ee9fa748e01c65b519926a27ad8b7f4f

  • SHA1

    9ecf8464a180d5a2b1cc36064eecf45bd0603057

  • SHA256

    c150d7ef9c7fd6dcee083f740f99892f58e98343085f0a5dba568a2df3b38d12

  • SHA512

    ed75155bc3be87a6357858eac6006a9495aef6c34ace857f74ad31a1b5b1037826dcfdfb3686a265d034c2341e11da22124dcf8516197c2dc902cc8e3cbd3bf2

  • SSDEEP

    196608:b7APUNNECwHrc8u3x3AEcq/fByuKlWH3CTou+VQBWG:baUvQHrc8u3xXJ/f4uUWHGB

Score
3/10

Malware Config

Signatures

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-09-21_ee9fa748e01c65b519926a27ad8b7f4f_cobalt-strike_hijackloader_ryuk
    .exe windows:5 windows x64 arch:x64

    de3ca1063f296a07162a7f96227c6216


    Headers

    Imports

    Exports

    Sections