General

  • Target

    2024-11-28_49af26cbbe3fd0f7b13764652501dca2_cobalt-strike_ryuk

  • Size

    26.4MB

  • Sample

    241128-lhf9casrh1

  • MD5

    49af26cbbe3fd0f7b13764652501dca2

  • SHA1

    352db76fbfedb374f25f143971c38b4b8915893b

  • SHA256

    fb3e279923678a38d19ed8711f842e88f4845822b77e05f0d4cf52b05093b161

  • SHA512

    7e05310f7d1a1305f280fe80bb6181bb8d7789500d438762b4cb8bd794b720ff9315198fe89ce1623bdcf7bbff2fc25146a3c096f79718523f3716c024d9c0ba

  • SSDEEP

    393216:mqNKqMEAdwPzRwBke2ZYg/LoZ86GfvLDztAmM:rNAEAdw7uke2fLoVGfvLO

Malware Config

Targets

    • Target

      2024-11-28_49af26cbbe3fd0f7b13764652501dca2_cobalt-strike_ryuk

    • Size

      26.4MB

    • MD5

      49af26cbbe3fd0f7b13764652501dca2

    • SHA1

      352db76fbfedb374f25f143971c38b4b8915893b

    • SHA256

      fb3e279923678a38d19ed8711f842e88f4845822b77e05f0d4cf52b05093b161

    • SHA512

      7e05310f7d1a1305f280fe80bb6181bb8d7789500d438762b4cb8bd794b720ff9315198fe89ce1623bdcf7bbff2fc25146a3c096f79718523f3716c024d9c0ba

    • SSDEEP

      393216:mqNKqMEAdwPzRwBke2ZYg/LoZ86GfvLDztAmM:rNAEAdw7uke2fLoVGfvLO

    • Panda Stealer payload

    • PandaStealer

      Panda Stealer is a fork of CollectorProject Stealer written in C++.

    • Pandastealer family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks