General
-
Target
ab693f4bd208bbf9be518f475beeec755499f6980317690aced41b35fb10f2e2
-
Size
569KB
-
Sample
230828-sgw2qsfa2w
-
MD5
b6fd2cd28c484b5a9f8c104c72066636
-
SHA1
f9177b183e6ccb018b59e28812250855f4f3a357
-
SHA256
ab693f4bd208bbf9be518f475beeec755499f6980317690aced41b35fb10f2e2
-
SHA512
2722e4dc52cf27e0d8fe8aa16990916cf08d6716347e0082e89dab7a9f39907e31f40e1cc5485431c7a04e4e942ec55de00be315157fcbeb1ea88a286b41b474
-
SSDEEP
12288:tkk4zvLW+iiLMmWIFy/FQRpWpktfTNF7keYaHwWp1:Wk4vLW+iwFJFy2tfTNfBB
Static task
static1
Behavioral task
behavioral1
Sample
ab693f4bd208bbf9be518f475beeec755499f6980317690aced41b35fb10f2e2.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
ab693f4bd208bbf9be518f475beeec755499f6980317690aced41b35fb10f2e2.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
cobaltstrike
987654321
http://111.229.190.124:4433/en_US/all.js
-
access_type
512
-
beacon_type
2048
-
host
111.229.190.124,/en_US/all.js
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
polling_time
60000
-
port_number
4433
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCaVz/OBATRWv892OZCZF6Cax6wTdGEgOQoHKWJcXgk2FRIWMdAPD6AeTBL3ScXZPGZWXx0KMtJouM8eBBlCJT3o72DBPR5mbD8vWB2Te6eWbNXOJuTKpVrtrcGgBH7wGzq4/hKqer6MJOyVt0Sj73+k7NtGLjI2A4Fv40EKIOSeQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; WOW64; Trident/6.0; ASU2JS)
-
watermark
987654321
Targets
-
-
Target
ab693f4bd208bbf9be518f475beeec755499f6980317690aced41b35fb10f2e2
-
Size
569KB
-
MD5
b6fd2cd28c484b5a9f8c104c72066636
-
SHA1
f9177b183e6ccb018b59e28812250855f4f3a357
-
SHA256
ab693f4bd208bbf9be518f475beeec755499f6980317690aced41b35fb10f2e2
-
SHA512
2722e4dc52cf27e0d8fe8aa16990916cf08d6716347e0082e89dab7a9f39907e31f40e1cc5485431c7a04e4e942ec55de00be315157fcbeb1ea88a286b41b474
-
SSDEEP
12288:tkk4zvLW+iiLMmWIFy/FQRpWpktfTNF7keYaHwWp1:Wk4vLW+iwFJFy2tfTNfBB
Score10/10 -