General

  • Target

    2024-10-06_1128a18620d1b3ec6438dc046e6806e3_cobalt-strike_hijackloader_ryuk

  • Size

    13.6MB

  • MD5

    1128a18620d1b3ec6438dc046e6806e3

  • SHA1

    e14e23c0b94dee508637b22528b517c5c9c50a78

  • SHA256

    64a32a775c5844a77442543a94108924edcbae8dd02ca5a1342cec8210866a13

  • SHA512

    6ae1920169b997efc81e288cd9950cf9d85dbd21d361bf519042bb44dfcb97ba308c2de98f278beb6ac356635203e617ac52591f54c390aeff3b43e6442a1b9c

  • SSDEEP

    98304:HkSyHtiLvHqeVG+bZIa39IEeAX8JSS0lalD0IDqM3MJDFptq2e8pHfKdmlw0OKOt:ESqYGuIxAXMSS6BMcJR3jpHfKdmls7t

Score
3/10

Malware Config

Signatures

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-10-06_1128a18620d1b3ec6438dc046e6806e3_cobalt-strike_hijackloader_ryuk
    .exe windows:5 windows x64 arch:x64

    ed6e56d7fed34130c48b0a05c64585cf


    Headers

    Imports

    Sections