General

  • Target

    2024-10-04_75c4f710eebf4ae3b1f47c0775174b11_cobalt-strike_hijackloader_ryuk

  • Size

    12.6MB

  • MD5

    75c4f710eebf4ae3b1f47c0775174b11

  • SHA1

    cb68cff7c1075c27e71bc022318bcb2f16a3938c

  • SHA256

    4cb3efac757e6da05b6ea0434243fa20774e9a5e78dc11cc3775702f52e8bdc1

  • SHA512

    e936866c94fd7bb0291e346f8e864e9a14e4cd94b03f82283f2a8122c7a086d207d554bd8c961a68cddd3d089bb7405f0caa4c85df41f357fb031e8ea11b2b5d

  • SSDEEP

    196608:bLn8SiCGurDz5o/VP7TyT8xw3y0Kl2OCxnSB:bb78urDz5o/xT1wi0U2b

Score
3/10

Malware Config

Signatures

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-04_75c4f710eebf4ae3b1f47c0775174b11_cobalt-strike_hijackloader_ryuk
    .exe windows:5 windows x64 arch:x64

    15b0d359b0d004363a1c9a125be29113


    Headers

    Imports

    Exports

    Sections