General
-
Target
2012.exe
-
Size
17KB
-
Sample
230511-xa9rgaca9t
-
MD5
91dfd4cd53bd6b0a72529eecb2d3cf2e
-
SHA1
2635039766341d3e145caa96f7781fbcb3b61781
-
SHA256
c889866bbe2d83ac73d5ce53acb109c66cf3a84b4e9a7e8086ae257bd275f9b6
-
SHA512
f5aa178345b363ebd290913565888dd1943ebcc7205c75f6f87a5f398c31c183e8bde0c082dc5d5f5655646db3f013fe1a7eb3d67ba87f4a1964ed865562b8c1
-
SSDEEP
192:JDMAe4Ckj19RZZ6wpSfu1bKcq5uHj7khBDSeKNH4GxBwtBUbOj6kxiY:JDMAoKz6WtKEj7aBDix7wtbAY
Static task
static1
Behavioral task
behavioral1
Sample
2012.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2012.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
cobaltstrike
http://134.122.132.23:8899/w8Lb
-
user_agent
User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0)
Extracted
cobaltstrike
100000
http://134.122.132.23:8899/fwlink
-
access_type
512
-
host
134.122.132.23,/fwlink
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
polling_time
60000
-
port_number
8899
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCBT5rHEA5BAMKilfNOTXc7LlqTpwms3GkAO5z5LiR8LcZ+wIllnWQuABunIC7EdrEp1R8iHDF1wD8eFR+LJaYi7Klp/85agzm/HPIvqPtojsjXNH76TsBtWsJT18GP/RcFmXKtqH1mfuLRYhDQ87Ocxh2lrnCytNSvp8fyiGQDoQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
-
watermark
100000
Extracted
cobaltstrike
0
-
watermark
0
Targets
-
-
Target
2012.exe
-
Size
17KB
-
MD5
91dfd4cd53bd6b0a72529eecb2d3cf2e
-
SHA1
2635039766341d3e145caa96f7781fbcb3b61781
-
SHA256
c889866bbe2d83ac73d5ce53acb109c66cf3a84b4e9a7e8086ae257bd275f9b6
-
SHA512
f5aa178345b363ebd290913565888dd1943ebcc7205c75f6f87a5f398c31c183e8bde0c082dc5d5f5655646db3f013fe1a7eb3d67ba87f4a1964ed865562b8c1
-
SSDEEP
192:JDMAe4Ckj19RZZ6wpSfu1bKcq5uHj7khBDSeKNH4GxBwtBUbOj6kxiY:JDMAoKz6WtKEj7aBDix7wtbAY
Score10/10 -