General

  • Target

    2024-12-09_408d269f88ff42971b90a753244434bc_cobalt-strike_ryuk

  • Size

    1.6MB

  • MD5

    408d269f88ff42971b90a753244434bc

  • SHA1

    1344097baae98fb6b97e0ecf140b4365d18e7409

  • SHA256

    f026715efc584eeba3af993e4b93500299049e1a4ddc79418b10cbc7922cd812

  • SHA512

    11dd9831dc7d3da23be912e9821eba01347a4f7adcfb4bc76aa96458ed3f2b78415cfead87048d7be801c49dac67d0c21b107bacff3877dc434aa0495ff1c100

  • SSDEEP

    49152:Cfle4TPmuP5snVwGV706pMA8oxEFCRj6KIeVSc/zui+:CNePbxf6K2c/ii+

Score
10/10

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

192.168.0.106:443

Signatures

Files

  • 2024-12-09_408d269f88ff42971b90a753244434bc_cobalt-strike_ryuk
    .exe windows:6 windows x64 arch:x64

    69573714e11441683ea863c40a1c0d54


    Code Sign

    Headers

    Imports

    Sections