General

  • Target

    2024-10-03_af2c42efc38be23fbbc3be7b50ca0834_cobalt-strike_hijackloader_ryuk

  • Size

    14.9MB

  • MD5

    af2c42efc38be23fbbc3be7b50ca0834

  • SHA1

    eb05a68c0758dad71b818878f5e9d847d9bfbb56

  • SHA256

    3cde3c2f4116fb5855a452824b7caeb3d15f9443e5fab71d6a5304f26e8fb1ab

  • SHA512

    a6f9a7ea30f896e6df7ecef6370922425eb9251d7c795f1ef6e05ebee982f20d2d4aacc403a4ed31e803011ff2e2c6e67a3153518c09a18fed1793e1a7b18aa8

  • SSDEEP

    196608:A7APUNNECwHrc8u3x3AEcq/fByuKlWH3CTouvb0:AaUvQHrc8u3xXJ/f4uUWHqg

Score
3/10

Malware Config

Signatures

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-03_af2c42efc38be23fbbc3be7b50ca0834_cobalt-strike_hijackloader_ryuk
    .exe windows:5 windows x64 arch:x64

    de3ca1063f296a07162a7f96227c6216


    Headers

    Imports

    Exports

    Sections