General
-
Target
1.zip
-
Size
1.4MB
-
Sample
230206-ra95caeb93
-
MD5
7e8a611b58da05b8d6792334e8d461d0
-
SHA1
dd5b1bc8ade736cd135408109c824c731ea83f6b
-
SHA256
4ee574fe1dfeccd0651989b4dd2a774c485025e9c3268ad4eb06a96ec4305680
-
SHA512
eab0024d7527c16d2ad65c57d27fc2511d1d52fd4c88c489858358802eb9df68bcc47e538b3a38c3aba59b46304dda16c69f5c6f21299ee4badf199885dc927b
-
SSDEEP
24576:aqDFH3h03+6Pb+OHjsyz2sszKL5f+UULE76eMDgXdjAeoPJC1:fFq3vPsrsCcf+UULcOgXBATC
Static task
static1
Behavioral task
behavioral1
Sample
Windowsϵͳ©.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Windowsϵͳ©.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
cobaltstrike
391144938
http://45.32.104.11:65529/match
-
access_type
512
-
host
45.32.104.11,/match
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
polling_time
60000
-
port_number
65529
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCP0NktM8h30dUITwoqwA/NCVlSn0ovIwgYnvH9honJlXqIXJPzx57KQKzMOgwHcemL5fwfsOXmENe9WjEAxR2mp7VaEDFKi5kF0q0/RTzNb3LkZUbu/W62/etQ2uau9QpvXp+q7omTIL45eayzCvWGaBNrNxidfKglhUBdryXHrQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; Win64; x64; Trident/6.0; MAARJS)
-
watermark
391144938
Targets
-
-
Target
Windowsϵͳ©.exe
-
Size
1.5MB
-
MD5
5d7fb79b1f7b3c64eeca9ea0cedf18be
-
SHA1
d4be8a3fe5e1c571fdd36fcf363953d859c220da
-
SHA256
8565f1895133fa044efe5ac563bb394bcd529622cb6d79541dca74d41d6d31eb
-
SHA512
d4ecf193fb68423c409313ece8d3464c9a49a704ff21df120b98a034b333bd32061f99f35aae6f73a07f7cba06f05952a173033b442a94ec6fd948d3b8ee9363
-
SSDEEP
24576:yzbV+Aa3WN+6Ptlz43GCvTySJVsSx2sel6H5ziqyH+J4eIxoXBdcGcnXG:Zv3W+6Pw3XFsVss0ziqyHWooXrct
Score10/10-
Blocklisted process makes network request
-