General

  • Target

    2024-10-13_997a95e39200774b54026588764af6b0_cobalt-strike_ryuk

  • Size

    1.8MB

  • Sample

    241013-lpt4sazdqe

  • MD5

    997a95e39200774b54026588764af6b0

  • SHA1

    45c8fb7d7826e02ffcb6fc955e8d15a756c9bb42

  • SHA256

    2ca012bbf4782da9ef089b5da664dde93f419bbe763c3ea7fad70257e9d611f9

  • SHA512

    8ae969dff6b832317897a3c21f20483fcd08140c9c4c2ae6d4f8ec28c673fb20f5c9df11b569708e256aabff89b339b735870f44921f4928da6d462504454fa0

  • SSDEEP

    49152:TKfuPS3ELNjV7SZxEfOfOgwf0/aB0zj0yjoB2:Am9OZxwgCB2Yyjl

Malware Config

Targets

    • Target

      2024-10-13_997a95e39200774b54026588764af6b0_cobalt-strike_ryuk

    • Size

      1.8MB

    • MD5

      997a95e39200774b54026588764af6b0

    • SHA1

      45c8fb7d7826e02ffcb6fc955e8d15a756c9bb42

    • SHA256

      2ca012bbf4782da9ef089b5da664dde93f419bbe763c3ea7fad70257e9d611f9

    • SHA512

      8ae969dff6b832317897a3c21f20483fcd08140c9c4c2ae6d4f8ec28c673fb20f5c9df11b569708e256aabff89b339b735870f44921f4928da6d462504454fa0

    • SSDEEP

      49152:TKfuPS3ELNjV7SZxEfOfOgwf0/aB0zj0yjoB2:Am9OZxwgCB2Yyjl

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks