General

  • Target

    d2c0ecfa7eebd8667ae34b12757ed7ab746050bc97dbc6725dcd46c2c973ce78

  • Size

    6.5MB

  • MD5

    717cb37e928a3e08fad96159c8dcbed5

  • SHA1

    0f6b47a998f66554fb2ce6d55047f0d0d72544e0

  • SHA256

    d2c0ecfa7eebd8667ae34b12757ed7ab746050bc97dbc6725dcd46c2c973ce78

  • SHA512

    275092a3e3ffa4705c2ea1b52738ee1a032cf8b47ca5e9689e7f0d113a294bb25a442a0334111b0c62f58f4904a17cc8bdfae01734189a46a0813c3f698bfe37

  • SSDEEP

    196608:fMaOjdQmRJ8dA6l7aycBIGpEyUXIZVcfEL:cdQusl29bcf

Malware Config

Extracted

Family

cobaltstrike

C2

http://194.29.187.194:443/jquery-3.3.2.slim.min.js

Attributes
  • user_agent

    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Referer: http://code.jquery.com/ Accept-Encoding: gzip, deflate User-Agent: Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko

Signatures

  • Cobaltstrike family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • d2c0ecfa7eebd8667ae34b12757ed7ab746050bc97dbc6725dcd46c2c973ce78
    .exe windows x64

    0b5552dccd9d0a834cea55c0c8fc05be


    Headers

    Imports

    Sections

  • advanced.pyc