General
-
Target
a864712fe2bbd5910bbe6e9340508f4db6f4a8ae6f656700137f621440795ce6
-
Size
206KB
-
Sample
201109-97dbmrcc8s
-
MD5
5d011f186971be3f2f69b24bdfe411ea
-
SHA1
1bfcfc87d51b6ceeebbfd4037921f7a9586787d4
-
SHA256
a864712fe2bbd5910bbe6e9340508f4db6f4a8ae6f656700137f621440795ce6
-
SHA512
a1c0ef9242d833c129112fef33e4bd9475fefffead20c7ef8b5b301a63d4bccded4f22fc046a094ab48ba0ca261a5d62eac2cef8998a1f302b67ce1528d4fd1d
Static task
static1
Behavioral task
behavioral1
Sample
a864712fe2bbd5910bbe6e9340508f4db6f4a8ae6f656700137f621440795ce6.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
a864712fe2bbd5910bbe6e9340508f4db6f4a8ae6f656700137f621440795ce6.dll
Resource
win10v20201028
Malware Config
Extracted
cobaltstrike
http://185.80.92.4:9797/cm
-
access_type
512
-
host
185.80.92.4,/cm
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
pipe_name
\\%s\pipe\msagent_%x
-
polling_time
60000
-
port_number
9797
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDDE57ppXv4CLwKzFQQLDyu1ky37pGF7nnK1ak3yE+l6i2uB3tb+9x8MTWaa7rZ3TKO6RRm1bIGrhBuCVlkMH0hKOcxriBucfY3tu+cZU4vP+edeoe/Hp9ugUUOexiPOuTYmK9vI0gvfzOkRy8z4s3BEWJ7O6Gk4mZjwioV5ybOSwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; QQDownload 733; InfoPath.2)
Targets
-
-
Target
a864712fe2bbd5910bbe6e9340508f4db6f4a8ae6f656700137f621440795ce6
-
Size
206KB
-
MD5
5d011f186971be3f2f69b24bdfe411ea
-
SHA1
1bfcfc87d51b6ceeebbfd4037921f7a9586787d4
-
SHA256
a864712fe2bbd5910bbe6e9340508f4db6f4a8ae6f656700137f621440795ce6
-
SHA512
a1c0ef9242d833c129112fef33e4bd9475fefffead20c7ef8b5b301a63d4bccded4f22fc046a094ab48ba0ca261a5d62eac2cef8998a1f302b67ce1528d4fd1d
Score10/10-
ServiceHost packer
Detects ServiceHost packer used for .NET malware
-