General

  • Target

    2024-10-11_87a44fd04b48c997ec65fe043186aa2c_cobalt-strike_ryuk

  • Size

    1.8MB

  • Sample

    241011-3ptlpaveqp

  • MD5

    87a44fd04b48c997ec65fe043186aa2c

  • SHA1

    21a57dd09415915051310c8525598e75756b0da6

  • SHA256

    935ef4ad93b91ecc5a71d396cf1a31f80ad029152ec8b9815050220029aa6c12

  • SHA512

    91c4deeebc4205de0758143d5909e75909893c0f796c476535405edcf1f570052d7babce9e862b847588f3bcd0fe6f438d855be34bebc7ae6a357565eb0d856e

  • SSDEEP

    49152:kKfuPS3ELNjV7SZxEfOflgwf0KaB0zj0yjoB2:jm9OZxjgdB2Yyjl

Malware Config

Targets

    • Target

      2024-10-11_87a44fd04b48c997ec65fe043186aa2c_cobalt-strike_ryuk

    • Size

      1.8MB

    • MD5

      87a44fd04b48c997ec65fe043186aa2c

    • SHA1

      21a57dd09415915051310c8525598e75756b0da6

    • SHA256

      935ef4ad93b91ecc5a71d396cf1a31f80ad029152ec8b9815050220029aa6c12

    • SHA512

      91c4deeebc4205de0758143d5909e75909893c0f796c476535405edcf1f570052d7babce9e862b847588f3bcd0fe6f438d855be34bebc7ae6a357565eb0d856e

    • SSDEEP

      49152:kKfuPS3ELNjV7SZxEfOflgwf0KaB0zj0yjoB2:jm9OZxjgdB2Yyjl

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks