General
-
Target
2024-12-09_408d269f88ff42971b90a753244434bc_cobalt-strike_ryuk
-
Size
1.6MB
-
Sample
241209-x5hw8syjdv
-
MD5
408d269f88ff42971b90a753244434bc
-
SHA1
1344097baae98fb6b97e0ecf140b4365d18e7409
-
SHA256
f026715efc584eeba3af993e4b93500299049e1a4ddc79418b10cbc7922cd812
-
SHA512
11dd9831dc7d3da23be912e9821eba01347a4f7adcfb4bc76aa96458ed3f2b78415cfead87048d7be801c49dac67d0c21b107bacff3877dc434aa0495ff1c100
-
SSDEEP
49152:Cfle4TPmuP5snVwGV706pMA8oxEFCRj6KIeVSc/zui+:CNePbxf6K2c/ii+
Behavioral task
behavioral1
Sample
2024-12-09_408d269f88ff42971b90a753244434bc_cobalt-strike_ryuk.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-09_408d269f88ff42971b90a753244434bc_cobalt-strike_ryuk.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.0.106:443
Targets
-
-
Target
2024-12-09_408d269f88ff42971b90a753244434bc_cobalt-strike_ryuk
-
Size
1.6MB
-
MD5
408d269f88ff42971b90a753244434bc
-
SHA1
1344097baae98fb6b97e0ecf140b4365d18e7409
-
SHA256
f026715efc584eeba3af993e4b93500299049e1a4ddc79418b10cbc7922cd812
-
SHA512
11dd9831dc7d3da23be912e9821eba01347a4f7adcfb4bc76aa96458ed3f2b78415cfead87048d7be801c49dac67d0c21b107bacff3877dc434aa0495ff1c100
-
SSDEEP
49152:Cfle4TPmuP5snVwGV706pMA8oxEFCRj6KIeVSc/zui+:CNePbxf6K2c/ii+
Score1/10 -