General

  • Target

    2024-10-13_4094c6ab4627e4f53e4b9d5ee35b7721_cobalt-strike_ryuk

  • Size

    1.6MB

  • MD5

    4094c6ab4627e4f53e4b9d5ee35b7721

  • SHA1

    b290b34996d3f3ad788a5d13171714bd4cd72a31

  • SHA256

    8cc5c7b3a3dc503eb54e35c673401112b8c14bf97df9e0c62a44398699c78f66

  • SHA512

    d7140cf940cd09209118d60b492ab2daf669592b4f1df92e43b48241a0e62d6a578e7e6a001b05093094b0f6fe0e28402423956617ce8eb7c9aeb9c9c9fe8547

  • SSDEEP

    49152:LSOZbnobaKdoUmsOATR5HhgglRj6KIeVSc/zui+:u7aKzT5Bhz6K2c/ii+

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.1.10:4444

Signatures

Files

  • 2024-10-13_4094c6ab4627e4f53e4b9d5ee35b7721_cobalt-strike_ryuk
    .exe windows:6 windows x64 arch:x64

    69573714e11441683ea863c40a1c0d54


    Code Sign

    Headers

    Imports

    Sections