General

  • Target

    2024-12-24_0a9d0453c82cb3b844a55b060c642f02_cobalt-strike_ryuk

  • Size

    431KB

  • MD5

    0a9d0453c82cb3b844a55b060c642f02

  • SHA1

    0c259c22f9951714afa4574e0bf3d3d593f31654

  • SHA256

    48211afd43defedfee988ddd61304c263713532df59354592930de28806d0fd5

  • SHA512

    ae9c37f747ea01115660ec93af41a2a71170b2b4a8b46318bf49ae966b95cbb556e9e64e866b3e00b938729e4f38fa64f03d47e599390b853883e8d3ac3b352f

  • SSDEEP

    12288:zlDT3p9hoBJ8zXzLbm0utC5TEy+M9korXq1CGciS:JSP8bzLV0UTxpmp

Score
10/10

Malware Config

Signatures

  • Detects Strela Stealer payload 1 IoCs
  • Strela family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-12-24_0a9d0453c82cb3b844a55b060c642f02_cobalt-strike_ryuk
    .exe windows:6 windows x64 arch:x64

    05ed3448ec65bce5f84b85b481ecbd11


    Headers

    Imports

    Sections