General

  • Target

    2024-09-27_2e3e6f9f9ee037d6099d36e7cf03e9f0_cobalt-strike_ryuk

  • Size

    1.6MB

  • MD5

    2e3e6f9f9ee037d6099d36e7cf03e9f0

  • SHA1

    56f8a8ca1845f229a4d4ac56a86f7e12feedbe19

  • SHA256

    c9d5ac51591aa2625eda46e4bb9e53fca837b34b9668b98f7932cb7ee1f41e81

  • SHA512

    4a85b6ee5a467239a616123fbb0e6285e61d6266d35a2400500e8a77857e8ae95ba976dbdc826cf64c36fbdcc938828082d057928b372af7dbd51a554e06d5d8

  • SSDEEP

    49152:FlGL/dAShr/2U1whMhZRT5TsJX4Fe8Q1vSYmWRj6KIeVSc/zui+:KF2AscyPm26K2c/ii+

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.0.106:5555

Signatures

Files

  • 2024-09-27_2e3e6f9f9ee037d6099d36e7cf03e9f0_cobalt-strike_ryuk
    .exe windows:6 windows x64 arch:x64

    69573714e11441683ea863c40a1c0d54


    Code Sign

    Headers

    Imports

    Sections