General
-
Target
2025-01-05_9c0b4a4fe825b04e1f5bf35bd5b73b8f_cobalt-strike_ryuk
-
Size
3.1MB
-
Sample
250105-l7qt3s1ldv
-
MD5
9c0b4a4fe825b04e1f5bf35bd5b73b8f
-
SHA1
63929ea5284d01e9bbb735870dcb5525b1389128
-
SHA256
75acf95197b3097e37fd11e0d48eefb85d814eaff36ad60d9a20ee7df8d76c50
-
SHA512
0c1e6437ee3afa71ef51cd290ff7ce4c2eddec6dc2cc99567daefb5f8dd5c1d91ee75c3101317d8fc2376d85986ef61e5cab52a6675b92e9c07c53cf11670f2e
-
SSDEEP
24576:qiixlR6I3vbasXpLtwBOz9qhjDWsoQ4lFEHLEBINGIJkoqIUrKybKffn3kiIGHI8:UxVRsw6NxAI0jG
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-05_9c0b4a4fe825b04e1f5bf35bd5b73b8f_cobalt-strike_ryuk.exe
Resource
win7-20240903-en
Malware Config
Extracted
meduza
45.130.145.152
-
anti_dbg
true
-
anti_vm
true
-
build_name
SEO2.0
-
extensions
.txt; .doc; .xlsx
-
grabber_max_size
4.194304e+06
-
port
15666
-
self_destruct
false
Targets
-
-
Target
2025-01-05_9c0b4a4fe825b04e1f5bf35bd5b73b8f_cobalt-strike_ryuk
-
Size
3.1MB
-
MD5
9c0b4a4fe825b04e1f5bf35bd5b73b8f
-
SHA1
63929ea5284d01e9bbb735870dcb5525b1389128
-
SHA256
75acf95197b3097e37fd11e0d48eefb85d814eaff36ad60d9a20ee7df8d76c50
-
SHA512
0c1e6437ee3afa71ef51cd290ff7ce4c2eddec6dc2cc99567daefb5f8dd5c1d91ee75c3101317d8fc2376d85986ef61e5cab52a6675b92e9c07c53cf11670f2e
-
SSDEEP
24576:qiixlR6I3vbasXpLtwBOz9qhjDWsoQ4lFEHLEBINGIJkoqIUrKybKffn3kiIGHI8:UxVRsw6NxAI0jG
-
Meduza Stealer payload
-
Meduza family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-