General
-
Target
e29e20fcf49c63b0d8b6281bf5f79196f6b65e13da56413a0bfb36b9b1cd3fd5
-
Size
259KB
-
Sample
230829-c6yc4ahe66
-
MD5
a781ccf3cd2e2ff67f0fb0fe5e80b181
-
SHA1
fcee6386de3afb1c8ef9d67f66c111ade8738e29
-
SHA256
e29e20fcf49c63b0d8b6281bf5f79196f6b65e13da56413a0bfb36b9b1cd3fd5
-
SHA512
ff905525a491a687a4695414766304bfbd8055e4662190dc1f6c0959c9380dadd7e91186ce9166d5297376cc08889c4076969c38343d5687547615bc671f466b
-
SSDEEP
6144:uJqVG5d1IpMyibgkTZI6jHID90adBXsH/:u3d6tevoxNBXq
Behavioral task
behavioral1
Sample
e29e20fcf49c63b0d8b6281bf5f79196f6b65e13da56413a0bfb36b9b1cd3fd5.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
e29e20fcf49c63b0d8b6281bf5f79196f6b65e13da56413a0bfb36b9b1cd3fd5.dll
Resource
win10v2004-20230703-en
Malware Config
Extracted
cobaltstrike
666666
http://62.234.179.51:8900/g.pixel
-
access_type
512
-
host
62.234.179.51,/g.pixel
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
polling_time
60000
-
port_number
8900
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCaRzoJpfOzPCpbuH6RtQBTQBC74ZKHlqDhUU5cLu3ETia0IQl5CHg7X+kU0dDvwqEft4jA5qkuJTOKWM6JsLI+9HVmhluZwQowZ1uQG7WDrBIN5Os72l4KuJko1TihBYQP0GippZDUx+CcqrXOaH9U5QBAaKUeDDOtZ2VjboR58QIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; InfoPath.2; InfoPath.3)
-
watermark
666666
Targets
-
-
Target
e29e20fcf49c63b0d8b6281bf5f79196f6b65e13da56413a0bfb36b9b1cd3fd5
-
Size
259KB
-
MD5
a781ccf3cd2e2ff67f0fb0fe5e80b181
-
SHA1
fcee6386de3afb1c8ef9d67f66c111ade8738e29
-
SHA256
e29e20fcf49c63b0d8b6281bf5f79196f6b65e13da56413a0bfb36b9b1cd3fd5
-
SHA512
ff905525a491a687a4695414766304bfbd8055e4662190dc1f6c0959c9380dadd7e91186ce9166d5297376cc08889c4076969c38343d5687547615bc671f466b
-
SSDEEP
6144:uJqVG5d1IpMyibgkTZI6jHID90adBXsH/:u3d6tevoxNBXq
Score3/10 -