General

  • Target

    b0bbae88e03053b28769c3c7f7485b752fd431f756248006d6e1c1a0bb613893

  • Size

    744KB

  • Sample

    230828-ejdfhshc9y

  • MD5

    45eda054f9e2b7828ccc72b1afb521f6

  • SHA1

    0aa30f4024614e0d9ca6bb4e3e376024b9bb9f14

  • SHA256

    b0bbae88e03053b28769c3c7f7485b752fd431f756248006d6e1c1a0bb613893

  • SHA512

    e48b53a3a31da051921e4424fc494b45a3e3219396ea2b67ac7b880be7311bfbba6e114bd1d1d1e28ccf4617b120cda017145cc9d8ea03c5c87c40b10ba8a8a2

  • SSDEEP

    12288:AsjEeWYgeWYg955/155/S0Do/0Wr+o3WvUuzJZ7QIS+46EK+V2GXCNRq:AsjES/0Wr+38uJ1S6f+V2GS

Malware Config

Extracted

Family

cobaltstrike

Botnet

666666

C2

http://124.220.215.247:80/j.ad

Attributes
  • access_type

    512

  • host

    124.220.215.247,/j.ad

  • http_header1

    AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_header2

    AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_method1

    GET

  • http_method2

    POST

  • polling_time

    60000

  • port_number

    80

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCGdKPyVHAeyaw8FbsSRuYhok9iKqOlNOki9KirkcCyyHM40HIWHorDVtX+v+k9M1K1qiAGNkSIFUcqqh0BBva1KUd1IyBWAmjBhnlyLTSD7eeGATbc/JOXpZ+wKBDC/PoKIrIBRYUlUSKCjKbzb8pMbwV29kZfZBoBLSzBLdmliwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /submit.php

  • user_agent

    Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)

  • watermark

    666666

Extracted

Family

cobaltstrike

Botnet

0

Attributes
  • watermark

    0

Targets

    • Target

      b0bbae88e03053b28769c3c7f7485b752fd431f756248006d6e1c1a0bb613893

    • Size

      744KB

    • MD5

      45eda054f9e2b7828ccc72b1afb521f6

    • SHA1

      0aa30f4024614e0d9ca6bb4e3e376024b9bb9f14

    • SHA256

      b0bbae88e03053b28769c3c7f7485b752fd431f756248006d6e1c1a0bb613893

    • SHA512

      e48b53a3a31da051921e4424fc494b45a3e3219396ea2b67ac7b880be7311bfbba6e114bd1d1d1e28ccf4617b120cda017145cc9d8ea03c5c87c40b10ba8a8a2

    • SSDEEP

      12288:AsjEeWYgeWYg955/155/S0Do/0Wr+o3WvUuzJZ7QIS+46EK+V2GXCNRq:AsjES/0Wr+38uJ1S6f+V2GS

MITRE ATT&CK Matrix

Tasks