General

  • Target

    41445e186e90c37e3b98654040e6a9155282131c7f672db509aa67440dae3d84

  • Size

    259KB

  • Sample

    230908-vcdeyadg78

  • MD5

    559c822f83f3b1a170e3965f1392e190

  • SHA1

    cd8da208da8c69dd35227c56239c732992be5c7b

  • SHA256

    41445e186e90c37e3b98654040e6a9155282131c7f672db509aa67440dae3d84

  • SHA512

    9d7b01fb19b006427dd3442f05dc2b77f62bec2a3bb992472d5c15ec72418b567cb60df5561f7dff77d2864494f41e14ba6e2f718873b076c87517797edc7baa

  • SSDEEP

    6144:fJqVG5d1IpMyibgkTZI6jHID90awjBXKH/:f3d6tevox2BX8

Score
10/10

Malware Config

Extracted

Family

cobaltstrike

Botnet

100000

C2

http://13.229.134.180:80/_/scs/mail-static/_/js/

Attributes
  • access_type

    512

  • host

    13.229.134.180,/_/scs/mail-static/_/js/

  • http_header1

    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

  • http_header2

    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

  • http_method1

    GET

  • http_method2

    POST

  • jitter

    3840

  • polling_time

    1000

  • port_number

    80

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDabItIKqA2lxr4XuG1GIkQykzYfu6m5ooWRAcqul7qPRf4bERxPRN0qsi+eudidk7ofh+6HbiRv7U3RDPcN6EguFk/nFL3dEccWFeh1EnzzW9G7Q/Kl2oX+FLKb/h/f5xBCLiAT1WGjQtBBugv0M+lDALwNI/9YfSv222HrAiGLwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    5.37071616e+08

  • unknown2

    AAAABAAAAAEAAAF3AAAAAQAAAPoAAAACAAAABAAAAAIAAAAcAAAAAgAAACQAAAACAAAAEgAAAAIAAAAEAAAAAgAAABwAAAACAAAAJAAAAAIAAAARAAAAAgAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /mail/u/0/

  • user_agent

    Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0; MAM2)

  • watermark

    100000

Targets

    • Target

      41445e186e90c37e3b98654040e6a9155282131c7f672db509aa67440dae3d84

    • Size

      259KB

    • MD5

      559c822f83f3b1a170e3965f1392e190

    • SHA1

      cd8da208da8c69dd35227c56239c732992be5c7b

    • SHA256

      41445e186e90c37e3b98654040e6a9155282131c7f672db509aa67440dae3d84

    • SHA512

      9d7b01fb19b006427dd3442f05dc2b77f62bec2a3bb992472d5c15ec72418b567cb60df5561f7dff77d2864494f41e14ba6e2f718873b076c87517797edc7baa

    • SSDEEP

      6144:fJqVG5d1IpMyibgkTZI6jHID90awjBXKH/:f3d6tevox2BX8

    Score
    3/10

MITRE ATT&CK Matrix

Tasks