General
-
Target
admin.exe
-
Size
17KB
-
Sample
230508-c6gqcaae7w
-
MD5
cf9517248d87d99d6a04d7247c9a96d2
-
SHA1
00fde842803488887eeb2ac1f6e9e36b56564b35
-
SHA256
63abe27fb9a612a4e34cf1e5859e300a0c71fc599c740b5bf4bc297f216f4b33
-
SHA512
742839391db17049ac8db44d7d287f1aa19b5d6667650ac12bef50cff382e9e88a0cb54a59c88756d1a39ade60097e7043b7713e653c566c5f971a34c05eccd5
-
SSDEEP
192:JDMAe4Ckj19RZZ6wpSfu1bKcq5uHj7khBDSeKNH4Hp6ubKBUbOj6kxiY:JDMAoKz6WtKEj7aBDiSpvKbAY
Static task
static1
Behavioral task
behavioral1
Sample
admin.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
admin.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
cobaltstrike
http://106.55.199.146:9990/VrMH
-
user_agent
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Extracted
cobaltstrike
1234567890
http://106.55.199.146:9990/load
-
access_type
512
-
host
106.55.199.146,/load
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
polling_time
60000
-
port_number
9990
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDdHhuANiI3qYxtEQcT1muIGEYIi5APkYN20kolIEu/My8A8xrGstpnxFr3MVf3tXQ19b4jR+pD/KCLmeUYZBhM6GN4nVx/pRgZpC5vN6i8rP5+q3BgIf85OGvG/RzAqtpfm10wpYDuufZitwSMB7+IJjBssm0/24sZ+GMGK3YU/wIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; NP08; MAAU; NP08)
-
watermark
1234567890
Extracted
cobaltstrike
0
-
watermark
0
Targets
-
-
Target
admin.exe
-
Size
17KB
-
MD5
cf9517248d87d99d6a04d7247c9a96d2
-
SHA1
00fde842803488887eeb2ac1f6e9e36b56564b35
-
SHA256
63abe27fb9a612a4e34cf1e5859e300a0c71fc599c740b5bf4bc297f216f4b33
-
SHA512
742839391db17049ac8db44d7d287f1aa19b5d6667650ac12bef50cff382e9e88a0cb54a59c88756d1a39ade60097e7043b7713e653c566c5f971a34c05eccd5
-
SSDEEP
192:JDMAe4Ckj19RZZ6wpSfu1bKcq5uHj7khBDSeKNH4Hp6ubKBUbOj6kxiY:JDMAoKz6WtKEj7aBDiSpvKbAY
Score10/10 -