General
-
Target
2024-11-27_9a11d578aec96645e55e6d3ad1a10754_cobalt-strike_ryuk
-
Size
12.6MB
-
Sample
241127-kdc6fssnan
-
MD5
9a11d578aec96645e55e6d3ad1a10754
-
SHA1
68081fd06eb00b786eedd77d04bf2bcdd8c96c59
-
SHA256
41f3765a0f5435e542209f28978ed7ebcadee49913ad39ca5e07bf3fd65e365d
-
SHA512
ed422416b6268d9b34d5c007db106532b3f9d23786fcb9c06c05cd5f741381b5668a9a75feeda7ae2aa21fe3f55dd19ab85a55fe8685ac9a382036cefc89139a
-
SSDEEP
196608:t1dTxDY6HrI5x0wcs3FUYQUWzaf5hjlzQXP5vOjKAlAKTEEO7V8gi+:xpjr+OwcsVUYQUW+hhpexUKTK6h
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-27_9a11d578aec96645e55e6d3ad1a10754_cobalt-strike_ryuk.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://understanyb.cyou
Extracted
lumma
https://understanyb.cyou/api
Targets
-
-
Target
2024-11-27_9a11d578aec96645e55e6d3ad1a10754_cobalt-strike_ryuk
-
Size
12.6MB
-
MD5
9a11d578aec96645e55e6d3ad1a10754
-
SHA1
68081fd06eb00b786eedd77d04bf2bcdd8c96c59
-
SHA256
41f3765a0f5435e542209f28978ed7ebcadee49913ad39ca5e07bf3fd65e365d
-
SHA512
ed422416b6268d9b34d5c007db106532b3f9d23786fcb9c06c05cd5f741381b5668a9a75feeda7ae2aa21fe3f55dd19ab85a55fe8685ac9a382036cefc89139a
-
SSDEEP
196608:t1dTxDY6HrI5x0wcs3FUYQUWzaf5hjlzQXP5vOjKAlAKTEEO7V8gi+:xpjr+OwcsVUYQUW+hhpexUKTK6h
-
Lumma family
-
Suspicious use of SetThreadContext
-