General
-
Target
2024-12-08_200b46ef107bfbcee2c67f8deaf40a5d_cobalt-strike_ryuk
-
Size
1.6MB
-
Sample
241208-bte6bavlav
-
MD5
200b46ef107bfbcee2c67f8deaf40a5d
-
SHA1
9982837c3b27308aac4d13a157c2c15a63324998
-
SHA256
1ad77ee795789976bbd147565d6b3b43d7c3a98b077efafa02c6d7658ffc706d
-
SHA512
cf3bb9ee8573d165b0fa9c162bcd5c01515e7b7447f64c65dd5ca43b67d00e1e19169d3be94ed22b960374346ea3d4dad571dc47ac9e96c7b3b5d9734e81bb94
-
SSDEEP
49152:JC9GqlhiolDqfTWokzqHcOBi4ASuTzO3QTmdQQ:J4wcOBikemdJ
Behavioral task
behavioral1
Sample
2024-12-08_200b46ef107bfbcee2c67f8deaf40a5d_cobalt-strike_ryuk.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2024-12-08_200b46ef107bfbcee2c67f8deaf40a5d_cobalt-strike_ryuk.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.1.7:1234
Targets
-
-
Target
2024-12-08_200b46ef107bfbcee2c67f8deaf40a5d_cobalt-strike_ryuk
-
Size
1.6MB
-
MD5
200b46ef107bfbcee2c67f8deaf40a5d
-
SHA1
9982837c3b27308aac4d13a157c2c15a63324998
-
SHA256
1ad77ee795789976bbd147565d6b3b43d7c3a98b077efafa02c6d7658ffc706d
-
SHA512
cf3bb9ee8573d165b0fa9c162bcd5c01515e7b7447f64c65dd5ca43b67d00e1e19169d3be94ed22b960374346ea3d4dad571dc47ac9e96c7b3b5d9734e81bb94
-
SSDEEP
49152:JC9GqlhiolDqfTWokzqHcOBi4ASuTzO3QTmdQQ:J4wcOBikemdJ
Score1/10 -