General
-
Target
db3933de41cba008e3734a5481c09a2f3cb74ef2f80caf4887ea28e955b16d67
-
Size
2.9MB
-
Sample
230922-hkqc9aeb9s
-
MD5
85c6476be64e63c21f1a96a8ea3a16da
-
SHA1
cb79d3d425bbd38efec15e8d67eed6a914d028cb
-
SHA256
db3933de41cba008e3734a5481c09a2f3cb74ef2f80caf4887ea28e955b16d67
-
SHA512
7f8b7fa142e34ea4db447867ed1e11163f18d0314e19e3dd53aba924fff07bf412572170b039de88e304b7f8bdbce06e0e28ec19180a2a9a1ca0f977fa57fc63
-
SSDEEP
24576:/7oI45pLDx9La1O0R40prgcOrAxbfpO+fKnLRzqFlw3lDaYP1gJgL84SvciArJ23:MI45pLV9QOW4+rrs7QmPJ23
Static task
static1
Behavioral task
behavioral1
Sample
db3933de41cba008e3734a5481c09a2f3cb74ef2f80caf4887ea28e955b16d67.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
db3933de41cba008e3734a5481c09a2f3cb74ef2f80caf4887ea28e955b16d67.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
cobaltstrike
http://tesupdates.buzz:443/components/an.gif
-
user_agent
Host: tesupdates.buzz Accept: text/html,application/xhtml+xml,application/xml;q=0.9 accept-language: q=0.8,en-GB;q=0.7,en-US;q=0.9.7 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/99.0.4844.51 Safari/537.36 Edg/99.0.1140.31
Extracted
cobaltstrike
1359593325
http://tesupdates.buzz:443/nv.js
-
access_type
512
-
beacon_type
2048
-
host
tesupdates.buzz,/nv.js
-
http_header1
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
-
http_header2
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
-
http_method1
GET
-
http_method2
POST
-
jitter
9472
-
polling_time
30000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCngHBsTBazjgWWt5R2gZCmNr5rrEBoGHNTg1x4Q/qK22njloCyKoOrE2+oJPJYMeRw89a12c58npwe3s5SFWsI1ry1d+7ftlpDtJ6OX5/48I2dKcjk/vboaU5U9T9IMWrYxQMdz04+ZuPxp/rb0rWf3rUk3ep6vn6xXA+mv7NvDQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4.272630272e+09
-
unknown2
AAAABAAAAAIAAAFSAAAAAwAAAAsAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/common
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/99.0.4844.51 Safari/537.36 Edg/99.0.1140.31
-
watermark
1359593325
Targets
-
-
Target
db3933de41cba008e3734a5481c09a2f3cb74ef2f80caf4887ea28e955b16d67
-
Size
2.9MB
-
MD5
85c6476be64e63c21f1a96a8ea3a16da
-
SHA1
cb79d3d425bbd38efec15e8d67eed6a914d028cb
-
SHA256
db3933de41cba008e3734a5481c09a2f3cb74ef2f80caf4887ea28e955b16d67
-
SHA512
7f8b7fa142e34ea4db447867ed1e11163f18d0314e19e3dd53aba924fff07bf412572170b039de88e304b7f8bdbce06e0e28ec19180a2a9a1ca0f977fa57fc63
-
SSDEEP
24576:/7oI45pLDx9La1O0R40prgcOrAxbfpO+fKnLRzqFlw3lDaYP1gJgL84SvciArJ23:MI45pLV9QOW4+rrs7QmPJ23
Score10/10-
Suspicious use of NtSetInformationThreadHideFromDebugger
-