General

  • Target

    Xfourk19_browsingExe.exe

  • Size

    106KB

  • Sample

    230802-ws1e3shg8y

  • MD5

    e70d2f9258a0f784bdc3bd52e75a68bb

  • SHA1

    cb17fb4e8428cad71bef5123bd487d77449fcb80

  • SHA256

    963cacd7eeebfb09950668bf1c6adf5452b992fc09119835cd256c5d3cf17f91

  • SHA512

    ab75a8b7e13eb40271326280f45e6041f12654b1bd9522249f396a1fbb120b4d6fcc8cedeef699fbaf7c5ffdda9883ef7c788299e274488a68990820ad69c409

  • SSDEEP

    1536:SFJvJrURWA2/Xk/3d9nyFjshbrY03tFYwnv70ktqvyocqBA:grUM3I9pFFYSrtZwA

Malware Config

Extracted

Family

cobaltstrike

C2

http://208.87.129.179:843/c/msdownload/update/others/2020/10/29136389_

Attributes
  • user_agent

    Accept: */* Host: download.windowsupdate.com User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/1.40

Targets

    • Target

      Xfourk19_browsingExe.exe

    • Size

      106KB

    • MD5

      e70d2f9258a0f784bdc3bd52e75a68bb

    • SHA1

      cb17fb4e8428cad71bef5123bd487d77449fcb80

    • SHA256

      963cacd7eeebfb09950668bf1c6adf5452b992fc09119835cd256c5d3cf17f91

    • SHA512

      ab75a8b7e13eb40271326280f45e6041f12654b1bd9522249f396a1fbb120b4d6fcc8cedeef699fbaf7c5ffdda9883ef7c788299e274488a68990820ad69c409

    • SSDEEP

      1536:SFJvJrURWA2/Xk/3d9nyFjshbrY03tFYwnv70ktqvyocqBA:grUM3I9pFFYSrtZwA

    • Cobaltstrike

      Detected malicious payload which is part of Cobaltstrike.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks