General
-
Target
aloy64.exe
-
Size
387KB
-
Sample
221208-xvxyeaba76
-
MD5
1cb5a9c2bc4adfe101f6069d525ba9b2
-
SHA1
4bf7ed198da315016f0759dee4c5705f1cd465f0
-
SHA256
40ab463703114d972269c34abeecf0f796c88c20cceaaf0e582ed0a132e556fa
-
SHA512
522a061cff6e80e06101b96bae37d4e5e1e2e37fb0d9bd4f2612383454c7896450dc923535c77af4d4879f96556c89741cd1539ca51e248c6e71adc3b4de58be
-
SSDEEP
6144:fduncjk3xxCY3Z57rsM/f+xpnW3IpULzArfC43Qp951nHhZW4oI29NyA6xUjqQ43:f1jkRLsGGxpnWjL8G4qot9NGxUjqQ4L
Static task
static1
Behavioral task
behavioral1
Sample
aloy64.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
aloy64.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
cobaltstrike
666
http://aloyadakmashin.com:443/wp-content/chunky/
-
access_type
512
-
beacon_type
2048
-
dns_idle
6.7372036e+07
-
dns_sleep
8.1297408e+08
-
host
aloyadakmashin.com,/wp-content/chunky/
-
http_header1
AAAACgAAAF1BY2NlcHQ6IHRleHQvaHRtbCxhcHBsaWNhdGlvbi94aHRtbCt4bWwsYXBwbGljYXRpb24veG1sO3E9MC45LGltYWdlL2F2aWYsaW1hZ2Uvd2VicCwqLyo7cT0wLjgAAAAKAAAAH0FjY2VwdC1MYW5ndWFnZTogZW4tVVMsZW47cT0wLjUAAAAKAAAAIkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZSwgYnIAAAAKAAAAFkNvbm5lY3Rpb246IGtlZXAtYWxpdmUAAAAHAAAAAAAAAA8AAAANAAAAAQAAAAkvc291cC5naWYAAAAMAAAAAAAAAA==
-
http_header2
AAAACgAAAB5Db250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL2pzb24AAAAKAAAAEUNvbm5lY3Rpb246IGNsb3NlAAAABwAAAAAAAAAPAAAACAAAAAYAAAAOQXV0aGVudGljYXRpb24AAAAHAAAAAQAAAAMAAAACAAAATXsiaW1hZ2VfdXJsIiA6ICJodHRwOi8vbWVtZXNtaXgubmV0L21lZGlhL2NyZWF0ZWQvam9vd2RqLmpwZyIsICJhdXRoZGF0YSIgOiAiAAAAAQAAAAIifQAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
jitter
7680
-
maxdns
235
-
polling_time
60000
-
port_number
443
-
sc_process32
%windir%\syswow64\dfrgui.exe
-
sc_process64
%windir%\sysnative\dfrgui.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCX4nhDD3WcKiG506Ukr76p1v498VxCMF+5OUJHVJk/FLvIl6XZbERVkSfj2kXpTcbGMdU7Vww8W3uXL4vyoIpm0tvYNy0Rmv7zRROw5vifizKAqRJH+DtQA5eixTCBHat4RR2jeFHv1aYG7DpGcsTpJXm7gWz078E1kom69ROX7wIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
3.154317312e+09
-
unknown2
AAAABAAAAAIAAAAwAAAAAgAAADAAAAACAAAAMAAAAAIAAAAwAAAAAgAAADAAAAACAAAAMAAAAAIAAAAwAAAAAgAAADAAAAACAAAAMAAAAAIAAAAwAAAAAgAAADAAAAACAAAAMAAAAAIAAAAwAAAAAgAAADAAAAACAAAAMAAAAAIAAAAwAAAAAgAAADAAAAACAAAAMAAAAAIAAAAwAAAAAgAAACwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/picture_upload/
-
user_agent
Mozilla/5.0 (X11; CrOS x86_64 13597.94.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.186 Safari/537.36
-
watermark
666
Extracted
cobaltstrike
0
-
watermark
0
Targets
-
-
Target
aloy64.exe
-
Size
387KB
-
MD5
1cb5a9c2bc4adfe101f6069d525ba9b2
-
SHA1
4bf7ed198da315016f0759dee4c5705f1cd465f0
-
SHA256
40ab463703114d972269c34abeecf0f796c88c20cceaaf0e582ed0a132e556fa
-
SHA512
522a061cff6e80e06101b96bae37d4e5e1e2e37fb0d9bd4f2612383454c7896450dc923535c77af4d4879f96556c89741cd1539ca51e248c6e71adc3b4de58be
-
SSDEEP
6144:fduncjk3xxCY3Z57rsM/f+xpnW3IpULzArfC43Qp951nHhZW4oI29NyA6xUjqQ43:f1jkRLsGGxpnWjL8G4qot9NGxUjqQ4L
Score10/10 -