General

  • Target

    1a4b7466bae2824e11582d7927638906e9b4bfcab29459fedcbb671e02d64fe7

  • Size

    1.0MB

  • Sample

    220706-ce6kdshde6

  • MD5

    199b6a874e662eed3b4ca58f92209237

  • SHA1

    3f0096a6c8c7e7c06e40cc8d044744571c5c21ce

  • SHA256

    1a4b7466bae2824e11582d7927638906e9b4bfcab29459fedcbb671e02d64fe7

  • SHA512

    0f591a57261cd15109ee5e376ce4e06f1daa9e4212043da564557607ef90b00e33341cbfc1042c74ce1d3ee19f01b4dbb12b952ea9158b76fb4ad1c753ee5fe5

Malware Config

Extracted

Family

cobaltstrike

Botnet

0

Attributes
  • watermark

    0

Targets

    • Target

      1a4b7466bae2824e11582d7927638906e9b4bfcab29459fedcbb671e02d64fe7

    • Size

      1.0MB

    • MD5

      199b6a874e662eed3b4ca58f92209237

    • SHA1

      3f0096a6c8c7e7c06e40cc8d044744571c5c21ce

    • SHA256

      1a4b7466bae2824e11582d7927638906e9b4bfcab29459fedcbb671e02d64fe7

    • SHA512

      0f591a57261cd15109ee5e376ce4e06f1daa9e4212043da564557607ef90b00e33341cbfc1042c74ce1d3ee19f01b4dbb12b952ea9158b76fb4ad1c753ee5fe5

    • Cobaltstrike

      Detected malicious payload which is part of Cobaltstrike.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks