General
-
Target
1140-55-0x000007FEF6070000-0x000007FEF61C8000-memory.dmp
-
Size
1.3MB
-
Sample
221208-x4h6lsbb27
-
MD5
8cbe9f54da95e4b2885c2a4456352d4e
-
SHA1
a1b0c860f2cd121cb626ac6a9584cb805783ed44
-
SHA256
3e37934a22a1ab06ec1b2eee3217fca282c88a2c0fea3f893fdf71ba09fbee9f
-
SHA512
320fc2ebfc9043af06d629f3b1d4db1dbffaeeba3bf3d7abeb9dd80f3c68db5741a05e5d53938e2cfafbf157f67c6594d905bba94eff7c8bdc3bc4fae3e1beac
-
SSDEEP
12288:wG6cniFjTyLGqX97in2dA9oGk3Xo1e5hhECG:D6cnxiqXBin2dioGko1e5hhEC
Behavioral task
behavioral1
Sample
1140-55-0x000007FEF6070000-0x000007FEF61C8000-memory.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1140-55-0x000007FEF6070000-0x000007FEF61C8000-memory.dll
Resource
win10v2004-20221111-en
Malware Config
Extracted
cobaltstrike
666
http://aloyadakmashin.com:443/wp-content/chunky/
-
access_type
512
-
beacon_type
2048
-
dns_idle
6.7372036e+07
-
dns_sleep
8.1297408e+08
-
host
aloyadakmashin.com,/wp-content/chunky/
-
http_header1
AAAACgAAAF1BY2NlcHQ6IHRleHQvaHRtbCxhcHBsaWNhdGlvbi94aHRtbCt4bWwsYXBwbGljYXRpb24veG1sO3E9MC45LGltYWdlL2F2aWYsaW1hZ2Uvd2VicCwqLyo7cT0wLjgAAAAKAAAAH0FjY2VwdC1MYW5ndWFnZTogZW4tVVMsZW47cT0wLjUAAAAKAAAAIkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZSwgYnIAAAAKAAAAFkNvbm5lY3Rpb246IGtlZXAtYWxpdmUAAAAHAAAAAAAAAA8AAAANAAAAAQAAAAkvc291cC5naWYAAAAMAAAAAAAAAA==
-
http_header2
AAAACgAAAB5Db250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL2pzb24AAAAKAAAAEUNvbm5lY3Rpb246IGNsb3NlAAAABwAAAAAAAAAPAAAACAAAAAYAAAAOQXV0aGVudGljYXRpb24AAAAHAAAAAQAAAAMAAAACAAAATXsiaW1hZ2VfdXJsIiA6ICJodHRwOi8vbWVtZXNtaXgubmV0L21lZGlhL2NyZWF0ZWQvam9vd2RqLmpwZyIsICJhdXRoZGF0YSIgOiAiAAAAAQAAAAIifQAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
jitter
7680
-
maxdns
235
-
polling_time
60000
-
port_number
443
-
sc_process32
%windir%\syswow64\dfrgui.exe
-
sc_process64
%windir%\sysnative\dfrgui.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCX4nhDD3WcKiG506Ukr76p1v498VxCMF+5OUJHVJk/FLvIl6XZbERVkSfj2kXpTcbGMdU7Vww8W3uXL4vyoIpm0tvYNy0Rmv7zRROw5vifizKAqRJH+DtQA5eixTCBHat4RR2jeFHv1aYG7DpGcsTpJXm7gWz078E1kom69ROX7wIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
3.154317312e+09
-
unknown2
AAAABAAAAAIAAAAwAAAAAgAAADAAAAACAAAAMAAAAAIAAAAwAAAAAgAAADAAAAACAAAAMAAAAAIAAAAwAAAAAgAAADAAAAACAAAAMAAAAAIAAAAwAAAAAgAAADAAAAACAAAAMAAAAAIAAAAwAAAAAgAAADAAAAACAAAAMAAAAAIAAAAwAAAAAgAAADAAAAACAAAAMAAAAAIAAAAwAAAAAgAAACwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/picture_upload/
-
user_agent
Mozilla/5.0 (X11; CrOS x86_64 13597.94.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.186 Safari/537.36
-
watermark
666
Targets
-
-
Target
1140-55-0x000007FEF6070000-0x000007FEF61C8000-memory.dmp
-
Size
1.3MB
-
MD5
8cbe9f54da95e4b2885c2a4456352d4e
-
SHA1
a1b0c860f2cd121cb626ac6a9584cb805783ed44
-
SHA256
3e37934a22a1ab06ec1b2eee3217fca282c88a2c0fea3f893fdf71ba09fbee9f
-
SHA512
320fc2ebfc9043af06d629f3b1d4db1dbffaeeba3bf3d7abeb9dd80f3c68db5741a05e5d53938e2cfafbf157f67c6594d905bba94eff7c8bdc3bc4fae3e1beac
-
SSDEEP
12288:wG6cniFjTyLGqX97in2dA9oGk3Xo1e5hhECG:D6cnxiqXBin2dioGko1e5hhEC
Score1/10 -