General

  • Target

    2024-10-17_3719f30f9167b10fdfdd0bd80ce51978_cobalt-strike_ryuk

  • Size

    1.8MB

  • Sample

    241017-w44a4syeke

  • MD5

    3719f30f9167b10fdfdd0bd80ce51978

  • SHA1

    8ce7fa0a4a54b80c5dc9690571ab12355985de08

  • SHA256

    ac8718adfcebec6ced00e40e53bcb49127ef6df075605897052d300ee60c15f3

  • SHA512

    4b71156c12c1a71274be28a304fd73181c38327646c5907f1536f23cfa7023265b8a14b0881fb30ed4359aad1515931cf73331a46f97a1c59be3fc1db6079025

  • SSDEEP

    49152:2KfuPS3ELNjV7yZxEfOfOgwf0pe30jaNf1TWbdz:Bm92Zxwg5U023W

Malware Config

Targets

    • Target

      2024-10-17_3719f30f9167b10fdfdd0bd80ce51978_cobalt-strike_ryuk

    • Size

      1.8MB

    • MD5

      3719f30f9167b10fdfdd0bd80ce51978

    • SHA1

      8ce7fa0a4a54b80c5dc9690571ab12355985de08

    • SHA256

      ac8718adfcebec6ced00e40e53bcb49127ef6df075605897052d300ee60c15f3

    • SHA512

      4b71156c12c1a71274be28a304fd73181c38327646c5907f1536f23cfa7023265b8a14b0881fb30ed4359aad1515931cf73331a46f97a1c59be3fc1db6079025

    • SSDEEP

      49152:2KfuPS3ELNjV7yZxEfOfOgwf0pe30jaNf1TWbdz:Bm92Zxwg5U023W

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks