General

  • Target

    adf145cba4ebdda11ad9b18e9eb0f2a48d02826f727d17185c60e7e48b1594e9

  • Size

    257KB

  • MD5

    3e731080de539db9fd247bfe3727060e

  • SHA1

    e44ae1fadc893de3eb21b695628f7ff2edaafc82

  • SHA256

    adf145cba4ebdda11ad9b18e9eb0f2a48d02826f727d17185c60e7e48b1594e9

  • SHA512

    b32ccabbcb44840a2bbec5555cf1dc9ea7eb1c6b829e756b6de8c66963b1867a9271fe8c7f819de0dc2bf82dce9129a36c47a89a6b3ff0274861b45fe77b5442

  • SSDEEP

    3072:T7gxjmVNvK8UNiHIw7zGy3fVMzJa1KGhDVTzD49vPWO/M0L80gHYJqDKU6:T7griHTHPKz0RTH83h/MPHM

Score
10/10

Malware Config

Extracted

Family

cobaltstrike

Botnet

0

C2

http://193.56.28.203:65533/visit.js

Attributes
  • access_type

    512

  • crypto_scheme

    256

  • host

    193.56.28.203,/visit.js

  • http_header1

    AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_header2

    AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_method1

    GET

  • http_method2

    POST

  • maxdns

    255

  • polling_time

    60000

  • port_number

    65533

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDdv97gf2zJ11X0Xn3IY1Hh9BE+ZmblbWqwuyyFTwGwwp5V76JA39hV974kLzPtBST0S5hwoNcEuN5m13k2ExsnKcAalDuRpCZMIfxrFxK+7e+3m4L03Fwxeea0W21uOj7cBPXaXMoL0CmVLOC6yfcdsyIFTI2TLQ3FLdU05sBPpwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /submit.php

  • user_agent

    Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; InfoPath.2; .NET4.0C; .NET4.0E)

  • watermark

    0

Signatures

Files

  • adf145cba4ebdda11ad9b18e9eb0f2a48d02826f727d17185c60e7e48b1594e9
    .dll windows x64

    b3fb86001908c53f2eb7c4d62ac6612a


    Headers

    Imports

    Exports

    Sections