General
-
Target
4a3b51ed4b180ae3d26167285c54e9fd
-
Size
2.0MB
-
Sample
230314-ew3k6sfd4x
-
MD5
4a3b51ed4b180ae3d26167285c54e9fd
-
SHA1
35953f0fdec9ac5f553c1d2f1e7a59a9c0c1ea3e
-
SHA256
505017f39e673fbe221f503c89310f788f6708ec4620b4e567bb515333daf571
-
SHA512
b2501daf4f5653be356574245b873b043e69e5594c4b23831d78ef932e4beed9af9ba1325d6882814611695cbdf5cd462867ac41100b1a88a205af583b5725b4
-
SSDEEP
24576:wN3e6a88SeMoIwvjGP4cHuv+nsaIDYugDhCQefY/D1:wN32qeVI4cOmDIDrgFC/Q/D1
Static task
static1
Behavioral task
behavioral1
Sample
4a3b51ed4b180ae3d26167285c54e9fd.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4a3b51ed4b180ae3d26167285c54e9fd.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
cobaltstrike
391144938
http://38.34.246.34:53622/activity
-
access_type
512
-
host
38.34.246.34,/activity
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
polling_time
60000
-
port_number
53622
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDVBhClIJw/ZYmg+FgZ7OypXJfFIvPxOcv3VOEJYEOzAqiRAwa/s41gEWOzZayXQj/mrldvoECN7Exbj1QOiWgZdN2JolXjiL+HXowEx1jA9EIW+Y35sYzL6ejefkDy19a8rVdayLSlmdevZb7lVPFjH+N9kaU8Z4ZC/wkG9c+dcwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENUS)
-
watermark
391144938
Targets
-
-
Target
4a3b51ed4b180ae3d26167285c54e9fd
-
Size
2.0MB
-
MD5
4a3b51ed4b180ae3d26167285c54e9fd
-
SHA1
35953f0fdec9ac5f553c1d2f1e7a59a9c0c1ea3e
-
SHA256
505017f39e673fbe221f503c89310f788f6708ec4620b4e567bb515333daf571
-
SHA512
b2501daf4f5653be356574245b873b043e69e5594c4b23831d78ef932e4beed9af9ba1325d6882814611695cbdf5cd462867ac41100b1a88a205af583b5725b4
-
SSDEEP
24576:wN3e6a88SeMoIwvjGP4cHuv+nsaIDYugDhCQefY/D1:wN32qeVI4cOmDIDrgFC/Q/D1
Score10/10 -