General
-
Target
2024-12-06_9c2b8a4eb917876f8cf81f6636df3475_cobalt-strike_ryuk
-
Size
1.6MB
-
Sample
241206-3cr74atkcx
-
MD5
9c2b8a4eb917876f8cf81f6636df3475
-
SHA1
cf9ff574241bc54d6c8b8acd7a3a35ee158503e7
-
SHA256
b54315d45de6ef40782fdf664526213dd104709f1fafca667379c8127de97bf7
-
SHA512
620bd7e47f8a59320187572126243f8d5b12bc7613e5a7ddd605bf3aac6906d7842e5a386eb8499a13b0e2ac39f88ebea53b2de94a47f027fc2023a3619af802
-
SSDEEP
49152:rKha/+cyVQ15lPzJkSnQOYnwOiYQBA7KVO3QTmdQQ:rPJN5BUKkemdJ
Behavioral task
behavioral1
Sample
2024-12-06_9c2b8a4eb917876f8cf81f6636df3475_cobalt-strike_ryuk.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-12-06_9c2b8a4eb917876f8cf81f6636df3475_cobalt-strike_ryuk.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/shell_bind_tcp
Targets
-
-
Target
2024-12-06_9c2b8a4eb917876f8cf81f6636df3475_cobalt-strike_ryuk
-
Size
1.6MB
-
MD5
9c2b8a4eb917876f8cf81f6636df3475
-
SHA1
cf9ff574241bc54d6c8b8acd7a3a35ee158503e7
-
SHA256
b54315d45de6ef40782fdf664526213dd104709f1fafca667379c8127de97bf7
-
SHA512
620bd7e47f8a59320187572126243f8d5b12bc7613e5a7ddd605bf3aac6906d7842e5a386eb8499a13b0e2ac39f88ebea53b2de94a47f027fc2023a3619af802
-
SSDEEP
49152:rKha/+cyVQ15lPzJkSnQOYnwOiYQBA7KVO3QTmdQQ:rPJN5BUKkemdJ
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-