General

  • Target

    admin.exe

  • Size

    17KB

  • Sample

    230508-c6gqcaae7w

  • MD5

    cf9517248d87d99d6a04d7247c9a96d2

  • SHA1

    00fde842803488887eeb2ac1f6e9e36b56564b35

  • SHA256

    63abe27fb9a612a4e34cf1e5859e300a0c71fc599c740b5bf4bc297f216f4b33

  • SHA512

    742839391db17049ac8db44d7d287f1aa19b5d6667650ac12bef50cff382e9e88a0cb54a59c88756d1a39ade60097e7043b7713e653c566c5f971a34c05eccd5

  • SSDEEP

    192:JDMAe4Ckj19RZZ6wpSfu1bKcq5uHj7khBDSeKNH4Hp6ubKBUbOj6kxiY:JDMAoKz6WtKEj7aBDiSpvKbAY

Malware Config

Extracted

Family

cobaltstrike

C2

http://106.55.199.146:9990/VrMH

Attributes
  • user_agent

    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)

Extracted

Family

cobaltstrike

Botnet

1234567890

C2

http://106.55.199.146:9990/load

Attributes
  • access_type

    512

  • host

    106.55.199.146,/load

  • http_header1

    AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_header2

    AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_method1

    GET

  • http_method2

    POST

  • polling_time

    60000

  • port_number

    9990

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDdHhuANiI3qYxtEQcT1muIGEYIi5APkYN20kolIEu/My8A8xrGstpnxFr3MVf3tXQ19b4jR+pD/KCLmeUYZBhM6GN4nVx/pRgZpC5vN6i8rP5+q3BgIf85OGvG/RzAqtpfm10wpYDuufZitwSMB7+IJjBssm0/24sZ+GMGK3YU/wIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /submit.php

  • user_agent

    Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; NP08; MAAU; NP08)

  • watermark

    1234567890

Extracted

Family

cobaltstrike

Botnet

0

Attributes
  • watermark

    0

Targets

    • Target

      admin.exe

    • Size

      17KB

    • MD5

      cf9517248d87d99d6a04d7247c9a96d2

    • SHA1

      00fde842803488887eeb2ac1f6e9e36b56564b35

    • SHA256

      63abe27fb9a612a4e34cf1e5859e300a0c71fc599c740b5bf4bc297f216f4b33

    • SHA512

      742839391db17049ac8db44d7d287f1aa19b5d6667650ac12bef50cff382e9e88a0cb54a59c88756d1a39ade60097e7043b7713e653c566c5f971a34c05eccd5

    • SSDEEP

      192:JDMAe4Ckj19RZZ6wpSfu1bKcq5uHj7khBDSeKNH4Hp6ubKBUbOj6kxiY:JDMAoKz6WtKEj7aBDiSpvKbAY

MITRE ATT&CK Matrix

Tasks