General
-
Target
2024-11-20_680a9c63e6d459a8c7c75360122f98d4_hijackloader_ryuk
-
Size
1.4MB
-
Sample
241120-d3vy8svlbk
-
MD5
680a9c63e6d459a8c7c75360122f98d4
-
SHA1
b8db117430c39820303e27d40883ab3c8508cf05
-
SHA256
9095393d34997cae8c568522d92b7ff1e4358e59a46be58453be8c5ac7da6042
-
SHA512
4261f9a82d8c4b4867ac1946e0d0427e76ca80804340b93b6d59ba6c30eb21093f7dac918143763beb6b4674aea2734df89f31bf9afab6b811466eb933548376
-
SSDEEP
24576:n9pfBeNtiWaDzOaB7E2qh/s3nI+msqTuToBGq1SN8:HioW0zOaB7E2C/s3IRDGqh
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-20_680a9c63e6d459a8c7c75360122f98d4_hijackloader_ryuk.exe
Resource
win7-20241010-en
Malware Config
Extracted
bumblebee
21maca
108.62.141.20:443
104.168.140.145:443
51.68.145.171:443
108.62.118.170:443
192.119.72.133:443
23.108.57.201:443
Targets
-
-
Target
2024-11-20_680a9c63e6d459a8c7c75360122f98d4_hijackloader_ryuk
-
Size
1.4MB
-
MD5
680a9c63e6d459a8c7c75360122f98d4
-
SHA1
b8db117430c39820303e27d40883ab3c8508cf05
-
SHA256
9095393d34997cae8c568522d92b7ff1e4358e59a46be58453be8c5ac7da6042
-
SHA512
4261f9a82d8c4b4867ac1946e0d0427e76ca80804340b93b6d59ba6c30eb21093f7dac918143763beb6b4674aea2734df89f31bf9afab6b811466eb933548376
-
SSDEEP
24576:n9pfBeNtiWaDzOaB7E2qh/s3nI+msqTuToBGq1SN8:HioW0zOaB7E2C/s3IRDGqh
-
Bumblebee family
-
Suspicious use of NtCreateThreadExHideFromDebugger
-