General
-
Target
7412c47f2db8f52182d8311dbc3539d2af5305c87f052a8d70eb6fd351723476
-
Size
833KB
-
Sample
220131-eq5tcaegbq
-
MD5
6cbb5480c075679075a54e84d626227e
-
SHA1
45c3f47d6ab9eabdf17e5748aeb0ec2a7b53a7b0
-
SHA256
7412c47f2db8f52182d8311dbc3539d2af5305c87f052a8d70eb6fd351723476
-
SHA512
15ed1bfda03fe02025ddf8a46079a423977de8b9c85d5bd3e6417107ac28fe0d67e001737e18cde2b3286192c6beceb4776f821152de0016288e8c64a16bb3e8
Behavioral task
behavioral1
Sample
7412c47f2db8f52182d8311dbc3539d2af5305c87f052a8d70eb6fd351723476.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
7412c47f2db8f52182d8311dbc3539d2af5305c87f052a8d70eb6fd351723476.exe
Resource
win10-en-20211208
Malware Config
Extracted
cobaltstrike
0
http://elmizan.net:443/assets/environment-f0a84e0c1.js
-
access_type
512
-
beacon_type
2048
-
host
elmizan.net,/assets/environment-f0a84e0c1.js
-
http_header1
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
-
http_header2
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
-
http_method1
GET
-
http_method2
POST
-
jitter
9472
-
polling_time
25000
-
port_number
443
-
sc_process32
%windir%\syswow64\dllhost1.exe
-
sc_process64
%windir%\sysnative\dllhost1.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDAiCh4wF6KoORIkmjMyT0SmCa5AxIL1YvLDdjToI8RcNZ16V2JMioWqUoruwUkf3cM4IDGZkLkYeramLzxM20hof9lUBexJWn/VE08u8qcbyfe8UWtO0QbhFrcursrKwPG52ie8/63tCCuMZcddIBHsOiBWL21b9JTEGCC9mrQ2wIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
3.3969984e+09
-
unknown2
AAAABAAAAAEAAAAyAAAAAgAAACQAAAACAAAlGQAAAA0AAAAPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/assets/chunk-vendor-4c69db4f.js
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36
-
watermark
0
Targets
-
-
Target
7412c47f2db8f52182d8311dbc3539d2af5305c87f052a8d70eb6fd351723476
-
Size
833KB
-
MD5
6cbb5480c075679075a54e84d626227e
-
SHA1
45c3f47d6ab9eabdf17e5748aeb0ec2a7b53a7b0
-
SHA256
7412c47f2db8f52182d8311dbc3539d2af5305c87f052a8d70eb6fd351723476
-
SHA512
15ed1bfda03fe02025ddf8a46079a423977de8b9c85d5bd3e6417107ac28fe0d67e001737e18cde2b3286192c6beceb4776f821152de0016288e8c64a16bb3e8
Score10/10 -