General
-
Target
8a102f6ee98016409b595277eeb67c60af90db1b1914a7725cf6fff2cae95ac7
-
Size
259KB
-
Sample
230906-3rg1nsdb36
-
MD5
6266615409a86dcb5c6160300f45971c
-
SHA1
3623e59fa39d312e9ea78f55e14cd255471aaccc
-
SHA256
8a102f6ee98016409b595277eeb67c60af90db1b1914a7725cf6fff2cae95ac7
-
SHA512
24c7c0772dcb7ab888c43da6df95b674c536cf02f980525609411da4557ed9627ceca91a745de1d1a733730a763ee3e680e719098a95a3fedeffe6345f5a2047
-
SSDEEP
6144:fJqVG5d1IpQyibgkTZI6jHID90a3BXmyH/:f3d6BevoxnBXX
Behavioral task
behavioral1
Sample
8a102f6ee98016409b595277eeb67c60af90db1b1914a7725cf6fff2cae95ac7.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
8a102f6ee98016409b595277eeb67c60af90db1b1914a7725cf6fff2cae95ac7.dll
Resource
win10v2004-20230831-en
Malware Config
Extracted
cobaltstrike
100000
http://service-j3lu1dcf-1259409518.bj.apigw.tencentcs.com:443/api/x
-
access_type
512
-
beacon_type
2048
-
host
service-j3lu1dcf-1259409518.bj.apigw.tencentcs.com,/api/x
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAcAAAAAAAAAAwAAAAIAAAAKU0VTU0lPTklEPQAAAAYAAAAGQ29va2llAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAcAAAAAAAAAAwAAAAIAAAAJSlNFU1NJT049AAAABgAAAAZDb29raWUAAAAHAAAAAQAAAAMAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
polling_time
3000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCNaPeqmN92G4uj1fPuRplEKnl6PamQ3e3WkKRHw/D8cMaPaYMe/309Va2F5Kwb9OS81AXA+zNH8DyyjfJ3d94m+Y1jF48gb9EbFwJd/iH5GdQFduYMSFfzAlXFlKWWzMgDSXPpBVvEOjkzw/iIFhCmy4pvKxKTRANZOhXD346eiwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
1.481970944e+09
-
unknown2
AAAABAAAAAMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/api/y
-
user_agent
Mozilla/5.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/5.0)
-
watermark
100000
Targets
-
-
Target
8a102f6ee98016409b595277eeb67c60af90db1b1914a7725cf6fff2cae95ac7
-
Size
259KB
-
MD5
6266615409a86dcb5c6160300f45971c
-
SHA1
3623e59fa39d312e9ea78f55e14cd255471aaccc
-
SHA256
8a102f6ee98016409b595277eeb67c60af90db1b1914a7725cf6fff2cae95ac7
-
SHA512
24c7c0772dcb7ab888c43da6df95b674c536cf02f980525609411da4557ed9627ceca91a745de1d1a733730a763ee3e680e719098a95a3fedeffe6345f5a2047
-
SSDEEP
6144:fJqVG5d1IpQyibgkTZI6jHID90a3BXmyH/:f3d6BevoxnBXX
Score5/10-
Drops file in System32 directory
-