Malware Analysis Report

2024-08-06 07:57

Sample ID 230626-evq6rahc9s
Target ee44c0692fd2ab2f01d17ca4b58ca6c7f79388cbc681f885bb17ec946514088c
SHA256 ee44c0692fd2ab2f01d17ca4b58ca6c7f79388cbc681f885bb17ec946514088c
Tags
cobaltstrike 1359593325 backdoor trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

ee44c0692fd2ab2f01d17ca4b58ca6c7f79388cbc681f885bb17ec946514088c

Threat Level: Known bad

The file ee44c0692fd2ab2f01d17ca4b58ca6c7f79388cbc681f885bb17ec946514088c was found to be: Known bad.

Malicious Activity Summary

cobaltstrike 1359593325 backdoor trojan

Cobaltstrike

Unsigned PE

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2023-06-26 04:15

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-06-26 04:15

Reported

2023-06-26 04:18

Platform

win7-20230621-en

Max time kernel

121s

Max time network

124s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ee44c0692fd2ab2f01d17ca4b58ca6c7f79388cbc681f885bb17ec946514088c.dll,#1

Signatures

Cobaltstrike

trojan backdoor cobaltstrike

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ee44c0692fd2ab2f01d17ca4b58ca6c7f79388cbc681f885bb17ec946514088c.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 dataplane.theyardservice.com udp
US 8.8.8.8:53 cdn.theyardservice.com udp
US 8.8.8.8:53 static.theyardservice.com udp
US 8.8.8.8:53 worldhomeoutlet.com udp

Files

memory/2044-54-0x00000000003B0000-0x00000000003F0000-memory.dmp

memory/2044-55-0x0000000001E20000-0x0000000002292000-memory.dmp

memory/2044-56-0x0000000001E20000-0x0000000002292000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-06-26 04:15

Reported

2023-06-26 04:18

Platform

win10v2004-20230621-en

Max time kernel

123s

Max time network

126s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ee44c0692fd2ab2f01d17ca4b58ca6c7f79388cbc681f885bb17ec946514088c.dll,#1

Signatures

Cobaltstrike

trojan backdoor cobaltstrike

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\ee44c0692fd2ab2f01d17ca4b58ca6c7f79388cbc681f885bb17ec946514088c.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 dataplane.theyardservice.com udp
US 8.8.8.8:53 71.121.18.2.in-addr.arpa udp
US 8.8.8.8:53 134.121.24.20.in-addr.arpa udp
US 52.168.117.170:443 tcp
US 8.8.8.8:53 cdn.theyardservice.com udp
US 192.229.221.95:80 tcp
US 93.184.221.240:80 tcp
US 93.184.221.240:80 tcp
US 93.184.221.240:80 tcp
US 93.184.221.240:80 tcp
US 93.184.221.240:80 tcp
GB 96.16.110.41:443 tcp
US 8.8.8.8:53 62.13.109.52.in-addr.arpa udp
US 8.8.8.8:53 static.theyardservice.com udp
US 8.8.8.8:53 worldhomeoutlet.com udp

Files

memory/4612-133-0x000001F58C6B0000-0x000001F58C6F0000-memory.dmp

memory/4612-134-0x000001F58E020000-0x000001F58E492000-memory.dmp

memory/4612-135-0x000001F58E020000-0x000001F58E492000-memory.dmp