General
-
Target
2.exe
-
Size
2.0MB
-
Sample
230720-kvvf3aec89
-
MD5
6e05feec72c24e517d5ca9c7d4c5230d
-
SHA1
2a0cf9469ef8c02f2eca77c5fe21074752de0bb6
-
SHA256
745418d007e99b5f6e3bd233972da89f97545b0ec94789df1072fccfeceea94a
-
SHA512
8d8694984425d30536650ac53f6396f849b87d840bd80d8d48cf58a007954750a435f122c29425ea64bb2aa5f063f82d4c8092f91e09442897256240075e718b
-
SSDEEP
24576:NEpuCIaT+gp6s0bIHJ/m317VhoicwuPV:NKaF
Static task
static1
Behavioral task
behavioral1
Sample
2.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
cobaltstrike
100000
http://js.yalafix.com:443/checkin
-
access_type
512
-
beacon_type
2048
-
host
js.yalafix.com,/checkin
-
http_header1
AAAABwAAAAAAAAALAAAAAgAAAAV1c2VyPQAAAAYAAAAGQ29va2llAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
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
-
http_method1
GET
-
http_method2
POST
-
jitter
6400
-
polling_time
35590
-
port_number
443
-
sc_process32
%windir%\syswow64\dllhost.exe
-
sc_process64
%windir%\sysnative\dllhost.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCi5mYDeyxD6LfU/3JVw4tHFt8tWVcZ/GLqz+OOYlbWJXy35VXpj8otusxAaAeXgKcy9MFG2Tly4j42Kuh1CEuq4SHyqaENQYdCWQr+0kOB6eb7Ju5wVnKHbX8m74gUkg5knjHUBB3hb7rK321OlEIvXs5ORWCNkoM9vqa+UZiRhwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
1.481970944e+09
-
unknown2
AAAABAAAAAMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/windowsxp/version.php
-
user_agent
Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
-
watermark
100000
Targets
-
-
Target
2.exe
-
Size
2.0MB
-
MD5
6e05feec72c24e517d5ca9c7d4c5230d
-
SHA1
2a0cf9469ef8c02f2eca77c5fe21074752de0bb6
-
SHA256
745418d007e99b5f6e3bd233972da89f97545b0ec94789df1072fccfeceea94a
-
SHA512
8d8694984425d30536650ac53f6396f849b87d840bd80d8d48cf58a007954750a435f122c29425ea64bb2aa5f063f82d4c8092f91e09442897256240075e718b
-
SSDEEP
24576:NEpuCIaT+gp6s0bIHJ/m317VhoicwuPV:NKaF
Score10/10 -