General

  • Target

    bb.exe

  • Size

    6.1MB

  • Sample

    230612-s1shnadd4t

  • MD5

    8d7ddd019aa24c40d144eb6dc8ad1d37

  • SHA1

    7353587e0558acb6c3968da6e1cf087acd9666e3

  • SHA256

    5e9fce10213c2f059d07ac100dfec510ac0b845ea86d60a9925ad822efd27fdc

  • SHA512

    364f4561fa4ca32b27311afdc1f87da6c0dd70419d84b291aab6d011f88cc2a4b3b3949a5a596fa952370200f05c2432afa0123e60e3152a76fc16b61fb34ab8

  • SSDEEP

    98304:OJuuoJOgoxATMpzoLLJ3TbwaVvrZE0Idx6miAAHdNq+Z8B6btq//qAJc:O0/JVhQ9onJ5hrZER7iLHdN2aV0

Malware Config

Extracted

Family

cobaltstrike

C2

http://123.207.211.161:6000/nC6v

Attributes
  • user_agent

    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)

Extracted

Family

cobaltstrike

Botnet

305419896

C2

http://123.207.211.161:6000/ptj

Attributes
  • access_type

    512

  • host

    123.207.211.161,/ptj

  • http_header1

    AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_header2

    AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_method1

    GET

  • http_method2

    POST

  • maxdns

    255

  • polling_time

    60000

  • port_number

    6000

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCTUlJ7J79z/MkkV8+MsYlOvREE2hhdGNzrKPFZ10lY0K5legA+um5JxESEaC0woDgSmOGrkh1giz/aQwd6tG4mihFgpi0oIbfwu6XZbE6ghYGyu2F7+A5TifRUzvU0YLXjK78EW12XhjHx4KopMF/AtOAueGwfiI2DmXwNzrBDvwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /submit.php

  • user_agent

    Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; MANM)

  • watermark

    305419896

Extracted

Family

cobaltstrike

Botnet

0

Attributes
  • watermark

    0

Targets

    • Target

      bb.exe

    • Size

      6.1MB

    • MD5

      8d7ddd019aa24c40d144eb6dc8ad1d37

    • SHA1

      7353587e0558acb6c3968da6e1cf087acd9666e3

    • SHA256

      5e9fce10213c2f059d07ac100dfec510ac0b845ea86d60a9925ad822efd27fdc

    • SHA512

      364f4561fa4ca32b27311afdc1f87da6c0dd70419d84b291aab6d011f88cc2a4b3b3949a5a596fa952370200f05c2432afa0123e60e3152a76fc16b61fb34ab8

    • SSDEEP

      98304:OJuuoJOgoxATMpzoLLJ3TbwaVvrZE0Idx6miAAHdNq+Z8B6btq//qAJc:O0/JVhQ9onJ5hrZER7iLHdN2aV0

MITRE ATT&CK Matrix

Tasks