General

  • Target

    2024-10-13_48b45545ebde660f07c70c1e8dcd8948_ryuk

  • Size

    1.6MB

  • MD5

    48b45545ebde660f07c70c1e8dcd8948

  • SHA1

    3a82032f57a36e0d114105aa924c1058bbde6076

  • SHA256

    0acb0b038a3ab03b89bcb3257f917a59175fffc741f77c1e228cfaf98e642829

  • SHA512

    2a9dc7629a386d16676ec1945d6a8760b351f50d5684308cd1a5a096873a2ab5393b7381d2a4789a6679e808d4f65e25f67ad7c11c910e1c83f79b2ca249469b

  • SSDEEP

    49152:ROIUM2tvhHYsUyAzFVJyB5sFWRj6KIeVSc/zui+:RlfWm9JViz6K2c/ii+

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.1.10:4444

Signatures

Files

  • 2024-10-13_48b45545ebde660f07c70c1e8dcd8948_ryuk
    .exe windows:6 windows x64 arch:x64

    69573714e11441683ea863c40a1c0d54


    Code Sign

    Headers

    Imports

    Sections

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.