Malware Analysis Report

2024-08-06 07:59

Sample ID 230626-evpypahc81
Target 923de5fc24a860522375e93ea09e4298e5a1dfaa6a17c61754162aa3d4339bce
SHA256 923de5fc24a860522375e93ea09e4298e5a1dfaa6a17c61754162aa3d4339bce
Tags
cobaltstrike 1359593325 backdoor trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

923de5fc24a860522375e93ea09e4298e5a1dfaa6a17c61754162aa3d4339bce

Threat Level: Known bad

The file 923de5fc24a860522375e93ea09e4298e5a1dfaa6a17c61754162aa3d4339bce was found to be: Known bad.

Malicious Activity Summary

cobaltstrike 1359593325 backdoor trojan

Cobaltstrike

Unsigned PE

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2023-06-26 04:15

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-06-26 04:15

Reported

2023-06-26 04:18

Platform

win7-20230621-en

Max time kernel

140s

Max time network

93s

Command Line

"C:\Users\Admin\AppData\Local\Temp\923de5fc24a860522375e93ea09e4298e5a1dfaa6a17c61754162aa3d4339bce.exe"

Signatures

Cobaltstrike

trojan backdoor cobaltstrike

Processes

C:\Users\Admin\AppData\Local\Temp\923de5fc24a860522375e93ea09e4298e5a1dfaa6a17c61754162aa3d4339bce.exe

"C:\Users\Admin\AppData\Local\Temp\923de5fc24a860522375e93ea09e4298e5a1dfaa6a17c61754162aa3d4339bce.exe"

Network

Country Destination Domain Proto
NL 192.236.146.5:80 tcp
NL 192.236.146.5:80 tcp
NL 192.236.146.5:80 tcp
NL 192.236.146.5:80 tcp

Files

memory/628-54-0x0000000000400000-0x0000000000458000-memory.dmp

memory/628-55-0x0000000000230000-0x0000000000237000-memory.dmp

memory/628-56-0x0000000000560000-0x0000000000593000-memory.dmp

memory/628-57-0x00000000005A0000-0x00000000005DD000-memory.dmp

memory/628-58-0x0000000000400000-0x0000000000458000-memory.dmp

memory/628-59-0x00000000752E0000-0x000000007532E000-memory.dmp

memory/628-62-0x0000000000230000-0x0000000000237000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-06-26 04:15

Reported

2023-06-26 04:18

Platform

win10v2004-20230621-en

Max time kernel

144s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\923de5fc24a860522375e93ea09e4298e5a1dfaa6a17c61754162aa3d4339bce.exe"

Signatures

Cobaltstrike

trojan backdoor cobaltstrike

Processes

C:\Users\Admin\AppData\Local\Temp\923de5fc24a860522375e93ea09e4298e5a1dfaa6a17c61754162aa3d4339bce.exe

"C:\Users\Admin\AppData\Local\Temp\923de5fc24a860522375e93ea09e4298e5a1dfaa6a17c61754162aa3d4339bce.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 13.85.23.206:443 tcp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 254.133.241.8.in-addr.arpa udp
US 8.8.8.8:53 142.145.190.20.in-addr.arpa udp
US 8.8.8.8:53 47.125.24.20.in-addr.arpa udp
SG 20.197.103.14:443 tcp
NL 192.236.146.5:80 tcp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 2.36.159.162.in-addr.arpa udp
US 8.8.8.8:53 254.49.247.8.in-addr.arpa udp
US 8.8.8.8:53 d.3.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.8.0.4.0.0.3.0.1.3.0.6.2.ip6.arpa udp
US 8.8.8.8:53 62.13.109.52.in-addr.arpa udp
US 8.8.8.8:53 8.3.197.209.in-addr.arpa udp
US 2.18.121.75:80 tcp
NL 192.236.146.5:80 tcp
NL 192.236.146.5:80 tcp

Files

memory/2440-133-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2440-134-0x0000000000640000-0x0000000000647000-memory.dmp

memory/2440-135-0x0000000000AE0000-0x0000000000B13000-memory.dmp

memory/2440-136-0x00000000025F0000-0x000000000262D000-memory.dmp

memory/2440-137-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2440-138-0x0000000075100000-0x000000007516A000-memory.dmp

memory/2440-139-0x00000000025F0000-0x000000000262D000-memory.dmp