General
-
Target
9edcf9664940435399ce1093902470cd617994b5b1d502fdf17800329ac18242.exe
-
Size
8.1MB
-
Sample
210723-n5ebmxa89j
-
MD5
2bd9c0ae977d28d89bc7e590e0996274
-
SHA1
d57823906ddf5697bf96fe2e985d93513de4bee9
-
SHA256
9edcf9664940435399ce1093902470cd617994b5b1d502fdf17800329ac18242
-
SHA512
4a8ecccaceab05cce0c779d3aeb13cf7f41ea7db124cfabbb5c77c62ddb43809485cad50a40c89ac912f34ced62be6598517e3c2e4540125bbad452763d4e036
Static task
static1
Behavioral task
behavioral1
Sample
9edcf9664940435399ce1093902470cd617994b5b1d502fdf17800329ac18242.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
9edcf9664940435399ce1093902470cd617994b5b1d502fdf17800329ac18242.exe
Resource
win10v20210410
Malware Config
Extracted
cobaltstrike
http://124.70.101.248:1008/GPuQ
-
user_agent
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB7.4; .NET4.0C)
Extracted
cobaltstrike
426352781
http://124.70.101.248:1008/match
-
access_type
512
-
host
124.70.101.248,/match
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
polling_time
60000
-
port_number
1008
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCZOgRI6sm8IBjYKqJ+3758Vrmhlni4OzMgmECQhm7SqAbZkqOnN5il/Dx7lIhCMNjYqIUebB+5Or5BkvJxMyMYNSF7dJIPMrWs2MtR43Gk+Zk/Dl9vG/S0lyBsdpidepGmifdWPM06h0MeklucSrjVBZnaett3axy54OLqV0zNfwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; WOW64; Trident/6.0; BOIE9;ENUS)
-
watermark
426352781
Targets
-
-
Target
9edcf9664940435399ce1093902470cd617994b5b1d502fdf17800329ac18242.exe
-
Size
8.1MB
-
MD5
2bd9c0ae977d28d89bc7e590e0996274
-
SHA1
d57823906ddf5697bf96fe2e985d93513de4bee9
-
SHA256
9edcf9664940435399ce1093902470cd617994b5b1d502fdf17800329ac18242
-
SHA512
4a8ecccaceab05cce0c779d3aeb13cf7f41ea7db124cfabbb5c77c62ddb43809485cad50a40c89ac912f34ced62be6598517e3c2e4540125bbad452763d4e036
Score10/10-
Loads dropped DLL
-