General
-
Target
2024-11-30_961a37e5ce83d4d9a41bfcb822d358ad_cobalt-strike_ryuk
-
Size
1.6MB
-
Sample
241130-mf36rs1pcw
-
MD5
961a37e5ce83d4d9a41bfcb822d358ad
-
SHA1
da2d256e7da3cca761c4f4418eaccdb63da0f525
-
SHA256
daacc1a0d28c2146908439f50b110c350a52622dabf8e96a21fc6aa529dc2b01
-
SHA512
7150f878374e06a8b081aa5cfb424583443ad61c5991d81c85b5113b4016959b5474a1f58595d57e5bb364cf6a3ce8d08d82c986e0ce7b72d07022262d4777bf
-
SSDEEP
24576:mqJ0wEKlXBGxoSt4S7h6S8t0oNBTl3qct9ocMQDYaLjEI22WnRYeWy4mdPvAfos8:mevRwoSGS7sDRlt9lMcYanO3QTmdQQ
Behavioral task
behavioral1
Sample
2024-11-30_961a37e5ce83d4d9a41bfcb822d358ad_cobalt-strike_ryuk.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-30_961a37e5ce83d4d9a41bfcb822d358ad_cobalt-strike_ryuk.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/reverse_tcp
10.0.2.15:4444
Targets
-
-
Target
2024-11-30_961a37e5ce83d4d9a41bfcb822d358ad_cobalt-strike_ryuk
-
Size
1.6MB
-
MD5
961a37e5ce83d4d9a41bfcb822d358ad
-
SHA1
da2d256e7da3cca761c4f4418eaccdb63da0f525
-
SHA256
daacc1a0d28c2146908439f50b110c350a52622dabf8e96a21fc6aa529dc2b01
-
SHA512
7150f878374e06a8b081aa5cfb424583443ad61c5991d81c85b5113b4016959b5474a1f58595d57e5bb364cf6a3ce8d08d82c986e0ce7b72d07022262d4777bf
-
SSDEEP
24576:mqJ0wEKlXBGxoSt4S7h6S8t0oNBTl3qct9ocMQDYaLjEI22WnRYeWy4mdPvAfos8:mevRwoSGS7sDRlt9lMcYanO3QTmdQQ
Score1/10 -