General

  • Target

    2024-11-14_bebfd4dfaa73236ac92a8acbb322e3ff_cobalt-strike_hijackloader_ryuk

  • Size

    4.7MB

  • MD5

    bebfd4dfaa73236ac92a8acbb322e3ff

  • SHA1

    ed4050809e09489962fd98762a8e468c145b59f2

  • SHA256

    b1c2ef39d20732dd1cacaa88637fd20c9ac3f1eb58463e6d6c722a4e8c2642f0

  • SHA512

    59137b676211de3e08f951f0b0de1262afe026e5ebd9a9f684191fa978f7691467381cfc7c98325e58b1005bb3c0014c3000a61ebe2566dd1232d8404500c77b

  • SSDEEP

    49152:Bz7rZIfffffffffWmvQi5e9ZyWNM4BKxvxNQQ7hJW6R0UklsBuVUiMFjfR2zediD:pVmMQK5JMFDgUnOF9

Score
3/10

Malware Config

Signatures

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-11-14_bebfd4dfaa73236ac92a8acbb322e3ff_cobalt-strike_hijackloader_ryuk
    .exe windows:5 windows x64 arch:x64

    90904a58b8ab97ee9c18145eafadf784


    Headers

    Imports

    Exports

    Sections