General
-
Target
bcd8ede3bfabede8366d700d8cdf53662ff62e845cf25a64cac177ebd44343f4
-
Size
44KB
-
Sample
221205-t9darsbg5z
-
MD5
9b4718b8b43236b948a614f28243cceb
-
SHA1
65f0114bebdc8dd717dcf6f65d1b5394fc92b838
-
SHA256
bcd8ede3bfabede8366d700d8cdf53662ff62e845cf25a64cac177ebd44343f4
-
SHA512
2cc398acb08ea068793ad6ef72971527273ab7a172912a0bba8347df8242bd54629c516ff5a77aa1c9f4b2930758ce119d660b5cb69edcbfe9de2686bc233f98
-
SSDEEP
768:a9pArINirfqKqjeJWIga14H0c4eea+3FxllNx6fHkQfOQQWB+2N23R:SiePSJ3lmH6F5FBHOOQvVN2h
Behavioral task
behavioral1
Sample
bcd8ede3bfabede8366d700d8cdf53662ff62e845cf25a64cac177ebd44343f4.docm
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bcd8ede3bfabede8366d700d8cdf53662ff62e845cf25a64cac177ebd44343f4.docm
Resource
win10v2004-20221111-en
Malware Config
Extracted
cobaltstrike
0
http://185.81.68.44:443/RELEASE.html
-
access_type
512
-
beacon_type
2048
-
host
185.81.68.44,/RELEASE.html
-
http_header1
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
-
http_header2
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
-
http_method1
GET
-
http_method2
POST
-
jitter
9984
-
polling_time
60618
-
port_number
443
-
sc_process32
%windir%\syswow64\regsvr32.exe
-
sc_process64
%windir%\sysnative\regsvr32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCnOM3nXx+7HBhkbDd+AwFrFisSunK999w2tM0uTpuuEiBalcJhcL+QgQWtf6S7zPp5hjImG+2YcPl18geU4f5JlSPXHwilbK4DFb/ePWyKFjhrA7emVRqhM21QMlo1ANsn14rY/RO2pzuft8P7TXoIjjI/B2GGVuzYNZX6X4I2EwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
3.025605888e+09
-
unknown2
AAAABAAAAAIAAAJYAAAAAwAAAA8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/cs
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.246
-
watermark
0
Targets
-
-
Target
bcd8ede3bfabede8366d700d8cdf53662ff62e845cf25a64cac177ebd44343f4
-
Size
44KB
-
MD5
9b4718b8b43236b948a614f28243cceb
-
SHA1
65f0114bebdc8dd717dcf6f65d1b5394fc92b838
-
SHA256
bcd8ede3bfabede8366d700d8cdf53662ff62e845cf25a64cac177ebd44343f4
-
SHA512
2cc398acb08ea068793ad6ef72971527273ab7a172912a0bba8347df8242bd54629c516ff5a77aa1c9f4b2930758ce119d660b5cb69edcbfe9de2686bc233f98
-
SSDEEP
768:a9pArINirfqKqjeJWIga14H0c4eea+3FxllNx6fHkQfOQQWB+2N23R:SiePSJ3lmH6F5FBHOOQvVN2h
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-