General

  • Target

    c0017a221f5b98167279aa74fe74f28e71ba89f990badbce9f3faa55900525a2

  • Size

    1.5MB

  • Sample

    230905-z7ptnsbd5z

  • MD5

    c1f1ef6a61e3a5580336abdd25926f34

  • SHA1

    26380b13ce721b92eaafd1f4e77d1170087a9e2e

  • SHA256

    c0017a221f5b98167279aa74fe74f28e71ba89f990badbce9f3faa55900525a2

  • SHA512

    bd7bc6e49cc84528164dc9e60e46b4ef497e06779e9f346f569f3f48717ddc06f5fca31354ed2b1dca34f759f3156e540fa6aa67da4f9524eb2533531e2833f8

  • SSDEEP

    24576:AIzwcVzB1oIFl1hJCzegrhhAz0xNHD1a99y:AIUclB11hJC6gdhM0xNHD1Iy

Malware Config

Extracted

Family

cobaltstrike

Botnet

0

Attributes
  • watermark

    0

Extracted

Family

cobaltstrike

Botnet

100000

C2

http://45.145.228.106:8181/updates.rss

Attributes
  • access_type

    512

  • host

    45.145.228.106,/updates.rss

  • http_header1

    AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_header2

    AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_method1

    GET

  • http_method2

    POST

  • jitter

    5120

  • polling_time

    3000

  • port_number

    8181

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCKoSQmN8bDHmkgGV5pBAZfhpBUWv+5h1Mlb+7ncWOcxrH/R1mCEBCZjOpkazsLkHOjXgDUJOpox99GrTFl019/oveH3mw5JfSoZKTlysv9Wc9pxf8D4yZmTdIzhDd+S7svjdpzeWjlg081vx3RPzZsU3o1kGb8VxnzqmRm866sOwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /submit.php

  • user_agent

    Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)

  • watermark

    100000

Targets

    • Target

      c0017a221f5b98167279aa74fe74f28e71ba89f990badbce9f3faa55900525a2

    • Size

      1.5MB

    • MD5

      c1f1ef6a61e3a5580336abdd25926f34

    • SHA1

      26380b13ce721b92eaafd1f4e77d1170087a9e2e

    • SHA256

      c0017a221f5b98167279aa74fe74f28e71ba89f990badbce9f3faa55900525a2

    • SHA512

      bd7bc6e49cc84528164dc9e60e46b4ef497e06779e9f346f569f3f48717ddc06f5fca31354ed2b1dca34f759f3156e540fa6aa67da4f9524eb2533531e2833f8

    • SSDEEP

      24576:AIzwcVzB1oIFl1hJCzegrhhAz0xNHD1a99y:AIUclB11hJC6gdhM0xNHD1Iy

MITRE ATT&CK Matrix

Tasks