General
-
Target
2024-12-10_84f7753edf9c14abe2ae0a839ab57d2d_ryuk
-
Size
1.6MB
-
Sample
241210-b5lr8stqbj
-
MD5
84f7753edf9c14abe2ae0a839ab57d2d
-
SHA1
cdf65b1163d2e49ab2982c33ac9c46f802064ec8
-
SHA256
e6e6248b621c36388dec5a1b086cdb557bac4fad21c70b431d5cf647cc7c7541
-
SHA512
1160233d996e2ffef1bcec9f785cd4d22b7ccdf00193808d67b7b5a0520f1c07d0fc6b23469ed51c488a2dec39976b303962a9f78d243789ac36e8979cb18a3b
-
SSDEEP
24576:2MVDdP0Jsavq6YAoN6E0FKqn/4rX1Z61+k5YmOd4TBPs/n8HYEI22WnRYeWy4mdJ:2MVDW+LhAq6E0FlAD4T9HYO3QTmdQQ
Behavioral task
behavioral1
Sample
2024-12-10_84f7753edf9c14abe2ae0a839ab57d2d_ryuk.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2024-12-10_84f7753edf9c14abe2ae0a839ab57d2d_ryuk.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/shell_reverse_tcp
192.168.152.147:4444
Targets
-
-
Target
2024-12-10_84f7753edf9c14abe2ae0a839ab57d2d_ryuk
-
Size
1.6MB
-
MD5
84f7753edf9c14abe2ae0a839ab57d2d
-
SHA1
cdf65b1163d2e49ab2982c33ac9c46f802064ec8
-
SHA256
e6e6248b621c36388dec5a1b086cdb557bac4fad21c70b431d5cf647cc7c7541
-
SHA512
1160233d996e2ffef1bcec9f785cd4d22b7ccdf00193808d67b7b5a0520f1c07d0fc6b23469ed51c488a2dec39976b303962a9f78d243789ac36e8979cb18a3b
-
SSDEEP
24576:2MVDdP0Jsavq6YAoN6E0FKqn/4rX1Z61+k5YmOd4TBPs/n8HYEI22WnRYeWy4mdJ:2MVDW+LhAq6E0FlAD4T9HYO3QTmdQQ
Score1/10 -