General

  • Target

    1140-55-0x000007FEF6070000-0x000007FEF61C8000-memory.dmp

  • Size

    1.3MB

  • Sample

    221208-x4h6lsbb27

  • MD5

    8cbe9f54da95e4b2885c2a4456352d4e

  • SHA1

    a1b0c860f2cd121cb626ac6a9584cb805783ed44

  • SHA256

    3e37934a22a1ab06ec1b2eee3217fca282c88a2c0fea3f893fdf71ba09fbee9f

  • SHA512

    320fc2ebfc9043af06d629f3b1d4db1dbffaeeba3bf3d7abeb9dd80f3c68db5741a05e5d53938e2cfafbf157f67c6594d905bba94eff7c8bdc3bc4fae3e1beac

  • SSDEEP

    12288:wG6cniFjTyLGqX97in2dA9oGk3Xo1e5hhECG:D6cnxiqXBin2dioGko1e5hhEC

Score
10/10

Malware Config

Extracted

Family

cobaltstrike

Botnet

666

C2

http://aloyadakmashin.com:443/wp-content/chunky/

Attributes
  • access_type

    512

  • beacon_type

    2048

  • dns_idle

    6.7372036e+07

  • dns_sleep

    8.1297408e+08

  • host

    aloyadakmashin.com,/wp-content/chunky/

  • http_header1

    AAAACgAAAF1BY2NlcHQ6IHRleHQvaHRtbCxhcHBsaWNhdGlvbi94aHRtbCt4bWwsYXBwbGljYXRpb24veG1sO3E9MC45LGltYWdlL2F2aWYsaW1hZ2Uvd2VicCwqLyo7cT0wLjgAAAAKAAAAH0FjY2VwdC1MYW5ndWFnZTogZW4tVVMsZW47cT0wLjUAAAAKAAAAIkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZSwgYnIAAAAKAAAAFkNvbm5lY3Rpb246IGtlZXAtYWxpdmUAAAAHAAAAAAAAAA8AAAANAAAAAQAAAAkvc291cC5naWYAAAAMAAAAAAAAAA==

  • http_header2

    AAAACgAAAB5Db250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL2pzb24AAAAKAAAAEUNvbm5lY3Rpb246IGNsb3NlAAAABwAAAAAAAAAPAAAACAAAAAYAAAAOQXV0aGVudGljYXRpb24AAAAHAAAAAQAAAAMAAAACAAAATXsiaW1hZ2VfdXJsIiA6ICJodHRwOi8vbWVtZXNtaXgubmV0L21lZGlhL2NyZWF0ZWQvam9vd2RqLmpwZyIsICJhdXRoZGF0YSIgOiAiAAAAAQAAAAIifQAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_method1

    GET

  • http_method2

    POST

  • jitter

    7680

  • maxdns

    235

  • polling_time

    60000

  • port_number

    443

  • sc_process32

    %windir%\syswow64\dfrgui.exe

  • sc_process64

    %windir%\sysnative\dfrgui.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCX4nhDD3WcKiG506Ukr76p1v498VxCMF+5OUJHVJk/FLvIl6XZbERVkSfj2kXpTcbGMdU7Vww8W3uXL4vyoIpm0tvYNy0Rmv7zRROw5vifizKAqRJH+DtQA5eixTCBHat4RR2jeFHv1aYG7DpGcsTpJXm7gWz078E1kom69ROX7wIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    3.154317312e+09

  • unknown2

    AAAABAAAAAIAAAAwAAAAAgAAADAAAAACAAAAMAAAAAIAAAAwAAAAAgAAADAAAAACAAAAMAAAAAIAAAAwAAAAAgAAADAAAAACAAAAMAAAAAIAAAAwAAAAAgAAADAAAAACAAAAMAAAAAIAAAAwAAAAAgAAADAAAAACAAAAMAAAAAIAAAAwAAAAAgAAADAAAAACAAAAMAAAAAIAAAAwAAAAAgAAACwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /picture_upload/

  • user_agent

    Mozilla/5.0 (X11; CrOS x86_64 13597.94.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.186 Safari/537.36

  • watermark

    666

Targets

    • Target

      1140-55-0x000007FEF6070000-0x000007FEF61C8000-memory.dmp

    • Size

      1.3MB

    • MD5

      8cbe9f54da95e4b2885c2a4456352d4e

    • SHA1

      a1b0c860f2cd121cb626ac6a9584cb805783ed44

    • SHA256

      3e37934a22a1ab06ec1b2eee3217fca282c88a2c0fea3f893fdf71ba09fbee9f

    • SHA512

      320fc2ebfc9043af06d629f3b1d4db1dbffaeeba3bf3d7abeb9dd80f3c68db5741a05e5d53938e2cfafbf157f67c6594d905bba94eff7c8bdc3bc4fae3e1beac

    • SSDEEP

      12288:wG6cniFjTyLGqX97in2dA9oGk3Xo1e5hhECG:D6cnxiqXBin2dioGko1e5hhEC

    Score
    1/10

MITRE ATT&CK Matrix

Tasks