General

  • Target

    ab693f4bd208bbf9be518f475beeec755499f6980317690aced41b35fb10f2e2

  • Size

    569KB

  • Sample

    230828-sgw2qsfa2w

  • MD5

    b6fd2cd28c484b5a9f8c104c72066636

  • SHA1

    f9177b183e6ccb018b59e28812250855f4f3a357

  • SHA256

    ab693f4bd208bbf9be518f475beeec755499f6980317690aced41b35fb10f2e2

  • SHA512

    2722e4dc52cf27e0d8fe8aa16990916cf08d6716347e0082e89dab7a9f39907e31f40e1cc5485431c7a04e4e942ec55de00be315157fcbeb1ea88a286b41b474

  • SSDEEP

    12288:tkk4zvLW+iiLMmWIFy/FQRpWpktfTNF7keYaHwWp1:Wk4vLW+iwFJFy2tfTNfBB

Malware Config

Extracted

Family

cobaltstrike

Botnet

987654321

C2

http://111.229.190.124:4433/en_US/all.js

Attributes
  • access_type

    512

  • beacon_type

    2048

  • host

    111.229.190.124,/en_US/all.js

  • http_header1

    AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_header2

    AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_method1

    GET

  • http_method2

    POST

  • polling_time

    60000

  • port_number

    4433

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCaVz/OBATRWv892OZCZF6Cax6wTdGEgOQoHKWJcXgk2FRIWMdAPD6AeTBL3ScXZPGZWXx0KMtJouM8eBBlCJT3o72DBPR5mbD8vWB2Te6eWbNXOJuTKpVrtrcGgBH7wGzq4/hKqer6MJOyVt0Sj73+k7NtGLjI2A4Fv40EKIOSeQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /submit.php

  • user_agent

    Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; WOW64; Trident/6.0; ASU2JS)

  • watermark

    987654321

Targets

    • Target

      ab693f4bd208bbf9be518f475beeec755499f6980317690aced41b35fb10f2e2

    • Size

      569KB

    • MD5

      b6fd2cd28c484b5a9f8c104c72066636

    • SHA1

      f9177b183e6ccb018b59e28812250855f4f3a357

    • SHA256

      ab693f4bd208bbf9be518f475beeec755499f6980317690aced41b35fb10f2e2

    • SHA512

      2722e4dc52cf27e0d8fe8aa16990916cf08d6716347e0082e89dab7a9f39907e31f40e1cc5485431c7a04e4e942ec55de00be315157fcbeb1ea88a286b41b474

    • SSDEEP

      12288:tkk4zvLW+iiLMmWIFy/FQRpWpktfTNF7keYaHwWp1:Wk4vLW+iwFJFy2tfTNfBB

MITRE ATT&CK Matrix

Tasks