General
-
Target
2024-12-19_8506115b70debd98387487ef4522339e_hijackloader_ryuk
-
Size
1.5MB
-
Sample
241219-ledn2sylg1
-
MD5
8506115b70debd98387487ef4522339e
-
SHA1
8d23903d8436bdcd19d411a56275ab23695880b4
-
SHA256
c06f62f9f1ccc978d6759cbd2046133ee99b9101cbb7b4de41c11b66b7ad3ac1
-
SHA512
122b70dcc3b2a9e756c49fcc9f7fb9b788a7127e8574e657408ed31199ca0f5330a53792a399306ae6b118a34ad2be6c16bfbec1cfe82b52b3bac8da36b47f5a
-
SSDEEP
24576:nMStV3JtR0crN1l7u6bC9Q3CTuxTNqqzdi7AeTzQLB2WWJb0VK++teL/+:33JtRxN1Y6bC9QSTuxSLkL6MK++teC
Behavioral task
behavioral1
Sample
2024-12-19_8506115b70debd98387487ef4522339e_hijackloader_ryuk.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-19_8506115b70debd98387487ef4522339e_hijackloader_ryuk.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp
115.236.153.174:39919
Targets
-
-
Target
2024-12-19_8506115b70debd98387487ef4522339e_hijackloader_ryuk
-
Size
1.5MB
-
MD5
8506115b70debd98387487ef4522339e
-
SHA1
8d23903d8436bdcd19d411a56275ab23695880b4
-
SHA256
c06f62f9f1ccc978d6759cbd2046133ee99b9101cbb7b4de41c11b66b7ad3ac1
-
SHA512
122b70dcc3b2a9e756c49fcc9f7fb9b788a7127e8574e657408ed31199ca0f5330a53792a399306ae6b118a34ad2be6c16bfbec1cfe82b52b3bac8da36b47f5a
-
SSDEEP
24576:nMStV3JtR0crN1l7u6bC9Q3CTuxTNqqzdi7AeTzQLB2WWJb0VK++teL/+:33JtRxN1Y6bC9QSTuxSLkL6MK++teC
Score1/10 -