General
-
Target
TelegramUpdate.exe
-
Size
225KB
-
Sample
230213-cazahsaa77
-
MD5
81aa27ad9f5fd8bbe15bf47c2bf27274
-
SHA1
fe834e58ea5082626e36453fd4935a9b0ea7fef0
-
SHA256
ff1d2120f0862987b44b2bb6f209c372cfdb83a3060d149a1b48f52b67c4672a
-
SHA512
55f7f3907487d7e6e72869e4b7cbd8c607400abd05b28b4500b4f22068be7b02140e4939d1bf5839be54416992a4964a7fe77ca0dc66fce9a5f50bae924a01c5
-
SSDEEP
3072:7aThtOURU92D+RN+2z7FHk/yS5a3IV4eOAg0FujD3NRaDuO7r6GiX8QiQ/fx:SwR26RN+UHUyjAO/aDuqr6SE3x
Static task
static1
Behavioral task
behavioral1
Sample
TelegramUpdate.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
TelegramUpdate.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
metasploit
windows/download_exec
http://45.77.174.98:50053/OTvC
Extracted
cobaltstrike
1234567890
http://45.77.174.98:50053/IE9CompatViewList.xml
-
access_type
512
-
beacon_type
2048
-
host
45.77.174.98,/IE9CompatViewList.xml
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
polling_time
60000
-
port_number
50053
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCAcZ1mihdRPV+jtXqlK5jFd8nSTP3W41By0zcVKim9A+XK254buCgb6LPzNx7nNi5x3juj3vvuRq9eZkTEIMWePcvMrbgbvOoMvQQYRGz1QFpnbrTBPF/gRpXlFXd276cTF7N9ykBj9r3XBL6pmkEn5Yndsk2DF6wlwZg6fpp29wIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0; NP06)
-
watermark
1234567890
Targets
-
-
Target
TelegramUpdate.exe
-
Size
225KB
-
MD5
81aa27ad9f5fd8bbe15bf47c2bf27274
-
SHA1
fe834e58ea5082626e36453fd4935a9b0ea7fef0
-
SHA256
ff1d2120f0862987b44b2bb6f209c372cfdb83a3060d149a1b48f52b67c4672a
-
SHA512
55f7f3907487d7e6e72869e4b7cbd8c607400abd05b28b4500b4f22068be7b02140e4939d1bf5839be54416992a4964a7fe77ca0dc66fce9a5f50bae924a01c5
-
SSDEEP
3072:7aThtOURU92D+RN+2z7FHk/yS5a3IV4eOAg0FujD3NRaDuO7r6GiX8QiQ/fx:SwR26RN+UHUyjAO/aDuqr6SE3x
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Drops file in System32 directory
-