Malware Analysis Report

2024-08-06 07:58

Sample ID 230807-gg9r2sfb31
Target f9e9d1069b64ad15fc9ae6967bbd7bbcc60a8d5cd9876a49f4ebc7eaed15e39e
SHA256 f9e9d1069b64ad15fc9ae6967bbd7bbcc60a8d5cd9876a49f4ebc7eaed15e39e
Tags
cobaltstrike 1359593325 backdoor trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

f9e9d1069b64ad15fc9ae6967bbd7bbcc60a8d5cd9876a49f4ebc7eaed15e39e

Threat Level: Known bad

The file f9e9d1069b64ad15fc9ae6967bbd7bbcc60a8d5cd9876a49f4ebc7eaed15e39e was found to be: Known bad.

Malicious Activity Summary

cobaltstrike 1359593325 backdoor trojan

Cobaltstrike

Unsigned PE

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2023-08-07 05:47

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-08-07 05:47

Reported

2023-08-07 05:50

Platform

win7-20230712-en

Max time kernel

140s

Max time network

136s

Command Line

"C:\Users\Admin\AppData\Local\Temp\f9e9d1069b64ad15fc9ae6967bbd7bbcc60a8d5cd9876a49f4ebc7eaed15e39e.exe"

Signatures

Cobaltstrike

trojan backdoor cobaltstrike

Processes

C:\Users\Admin\AppData\Local\Temp\f9e9d1069b64ad15fc9ae6967bbd7bbcc60a8d5cd9876a49f4ebc7eaed15e39e.exe

"C:\Users\Admin\AppData\Local\Temp\f9e9d1069b64ad15fc9ae6967bbd7bbcc60a8d5cd9876a49f4ebc7eaed15e39e.exe"

Network

Country Destination Domain Proto
N/A 172.16.11.134:8443 tcp
N/A 172.16.11.134:8443 tcp
N/A 172.16.11.134:8443 tcp
N/A 172.16.11.134:8443 tcp

Files

memory/1164-54-0x0000000000360000-0x0000000000393000-memory.dmp

memory/1164-55-0x00000000003A0000-0x00000000003DD000-memory.dmp

memory/1164-56-0x0000000000400000-0x000000000044B000-memory.dmp

memory/1164-57-0x00000000003A0000-0x00000000003DD000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-08-07 05:47

Reported

2023-08-07 05:50

Platform

win10v2004-20230703-en

Max time kernel

142s

Max time network

156s

Command Line

"C:\Users\Admin\AppData\Local\Temp\f9e9d1069b64ad15fc9ae6967bbd7bbcc60a8d5cd9876a49f4ebc7eaed15e39e.exe"

Signatures

Cobaltstrike

trojan backdoor cobaltstrike

Processes

C:\Users\Admin\AppData\Local\Temp\f9e9d1069b64ad15fc9ae6967bbd7bbcc60a8d5cd9876a49f4ebc7eaed15e39e.exe

"C:\Users\Admin\AppData\Local\Temp\f9e9d1069b64ad15fc9ae6967bbd7bbcc60a8d5cd9876a49f4ebc7eaed15e39e.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
N/A 172.16.11.134:8443 tcp
US 8.8.8.8:53 4.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 59.128.231.4.in-addr.arpa udp
US 8.8.8.8:53 146.78.124.51.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 1.202.248.87.in-addr.arpa udp
US 8.8.8.8:53 63.13.109.52.in-addr.arpa udp
N/A 172.16.11.134:8443 tcp
US 8.8.8.8:53 88.16.208.104.in-addr.arpa udp

Files

memory/4840-133-0x0000000000180000-0x00000000001B3000-memory.dmp

memory/4840-134-0x00000000001C0000-0x00000000001FD000-memory.dmp

memory/4840-135-0x0000000000400000-0x000000000044B000-memory.dmp

memory/4840-136-0x00000000001C0000-0x00000000001FD000-memory.dmp