General

  • Target

    2024-09-27_951253ebc4a99a4194d888bc83237249_cobalt-strike_hijackloader_ryuk

  • Size

    112.1MB

  • Sample

    240927-lggtgswaqp

  • MD5

    951253ebc4a99a4194d888bc83237249

  • SHA1

    1ebe2659f9cfb645505dee28408723a7253bb8b4

  • SHA256

    e0676e14798238498be7074dec41bf98c05c0146fbf49ec1371c7a4ab19a3052

  • SHA512

    41846ed72d534fcb61ccb990ad99c351e83e30189e24ce7565d697be3e4f5e2ce1fd4bae28f13064c2f48360422d173fe319509706d76da9e6a30569e26cf736

  • SSDEEP

    3145728:6eEMe2LQ0MFGOkjy7wBIz1zlYC5BoGFffU0ZM:REpMOk+mIz1zRfoWfXM

Malware Config

Targets

    • Target

      2024-09-27_951253ebc4a99a4194d888bc83237249_cobalt-strike_hijackloader_ryuk

    • Size

      112.1MB

    • MD5

      951253ebc4a99a4194d888bc83237249

    • SHA1

      1ebe2659f9cfb645505dee28408723a7253bb8b4

    • SHA256

      e0676e14798238498be7074dec41bf98c05c0146fbf49ec1371c7a4ab19a3052

    • SHA512

      41846ed72d534fcb61ccb990ad99c351e83e30189e24ce7565d697be3e4f5e2ce1fd4bae28f13064c2f48360422d173fe319509706d76da9e6a30569e26cf736

    • SSDEEP

      3145728:6eEMe2LQ0MFGOkjy7wBIz1zlYC5BoGFffU0ZM:REpMOk+mIz1zRfoWfXM

    • Downloads MZ/PE file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks