General
-
Target
extractor.exe
-
Size
6.5MB
-
Sample
230722-nt46nabc4w
-
MD5
ee71f97e010dfecb95f217d78b5f5aee
-
SHA1
820465e46c7873dcc611b7ad7e566fbf012dc11c
-
SHA256
7b04e268716678d10ea24a9c07db8bf6ecd4b783973e82a93a79023df8c5a896
-
SHA512
421bbdf1e0c80fa0209722e728cdeccd2fe561e802d0707442f5ccfa807e5631dd9dfdf894b3e0ba278d8f20ebf98f63b76868576cf1bf874f90a57647c27ebd
-
SSDEEP
98304:63Oapl8G3EQ7zUngGqwhxrrqAYhyHcgUzhSTaZ:6OaPH0I4gGqqxPqA18nFii
Static task
static1
Behavioral task
behavioral1
Sample
extractor.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
extractor.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
cobaltstrike
1580103824
http://60.204.200.204:9443/dpixel
-
access_type
512
-
beacon_type
2048
-
host
60.204.200.204,/dpixel
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
polling_time
60000
-
port_number
9443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCF3ioD+Lx+feILZ4VL0Xd31xn9MiLNXKh9Iwd5UuMP81ZehCl/YeFo+Z602r3t0JCWevAng65vhHXn7DNy5B9ZciT4AX8IDaOFmbrp2c9AQXy7pKhwGF3upwgG7DxIR/8sSt/6HvT016+bS2uFULumluXAnlYK148PrimovS6mBQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; MALC)
-
watermark
1580103824
Extracted
cobaltstrike
0
-
watermark
0
Targets
-
-
Target
extractor.exe
-
Size
6.5MB
-
MD5
ee71f97e010dfecb95f217d78b5f5aee
-
SHA1
820465e46c7873dcc611b7ad7e566fbf012dc11c
-
SHA256
7b04e268716678d10ea24a9c07db8bf6ecd4b783973e82a93a79023df8c5a896
-
SHA512
421bbdf1e0c80fa0209722e728cdeccd2fe561e802d0707442f5ccfa807e5631dd9dfdf894b3e0ba278d8f20ebf98f63b76868576cf1bf874f90a57647c27ebd
-
SSDEEP
98304:63Oapl8G3EQ7zUngGqwhxrrqAYhyHcgUzhSTaZ:6OaPH0I4gGqqxPqA18nFii
Score10/10-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-