General
-
Target
2024-12-19_9ce4f1cabf815eec94bb03bfa5652147_cobalt-strike_ryuk
-
Size
1.6MB
-
Sample
241219-bjszeszngt
-
MD5
9ce4f1cabf815eec94bb03bfa5652147
-
SHA1
00d29f0572eff20e61e2fa7bec0c74a3dbc17f58
-
SHA256
5aaea590e622e50b8df6265877e933263b91cb32aa978dbd2bf6138b9d4df01d
-
SHA512
2bf26390847da8b81cd50d9095ad077e91b243050bca012fe0f1247ea2f3ffdd50e785db2a164a97dc676c2420428f3446f4cb4a16029a6a711bd8392ecd853d
-
SSDEEP
49152:yQD3Y5JEJ6XneTAs3DF/++TPyJA2DxO3QTmdQQ:yV2CUAsKUemdp
Behavioral task
behavioral1
Sample
2024-12-19_9ce4f1cabf815eec94bb03bfa5652147_cobalt-strike_ryuk.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-19_9ce4f1cabf815eec94bb03bfa5652147_cobalt-strike_ryuk.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.100.40:443
Targets
-
-
Target
2024-12-19_9ce4f1cabf815eec94bb03bfa5652147_cobalt-strike_ryuk
-
Size
1.6MB
-
MD5
9ce4f1cabf815eec94bb03bfa5652147
-
SHA1
00d29f0572eff20e61e2fa7bec0c74a3dbc17f58
-
SHA256
5aaea590e622e50b8df6265877e933263b91cb32aa978dbd2bf6138b9d4df01d
-
SHA512
2bf26390847da8b81cd50d9095ad077e91b243050bca012fe0f1247ea2f3ffdd50e785db2a164a97dc676c2420428f3446f4cb4a16029a6a711bd8392ecd853d
-
SSDEEP
49152:yQD3Y5JEJ6XneTAs3DF/++TPyJA2DxO3QTmdQQ:yV2CUAsKUemdp
Score1/10 -