General

  • Target

    b9058796ff99c43c664cbbd9cd2d05b04d902f4ef5023d97577aec2ac69dbe7e

  • Size

    253KB

  • MD5

    52a3b355a1fd715deeb69d82c77d8e62

  • SHA1

    b763c54c350e37595966e0be5a69bcdcaa69fe50

  • SHA256

    b9058796ff99c43c664cbbd9cd2d05b04d902f4ef5023d97577aec2ac69dbe7e

  • SHA512

    4060dc612de629f6c3b66c89095e8ea96f9a6cc2dd688f8160788c38cf6c388f485dfc416f22541cb425e9c15b0fbc1ddb53294b37433e6a04b68e0e5028213b

  • SSDEEP

    3072:tVVK6EINn6uiwi3FPE/gpBItBJxrj15qSIT9AtxLE6FDLwa2Gx4YJcVMjka+A:LVKwgcIpBItB/dqTGtDDhP4Cjg

Score
10/10

Malware Config

Extracted

Family

cobaltstrike

Botnet

100000

Attributes
  • beacon_type

    512

  • http_header1

    AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_header2

    AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • pipe_name

    \\.\pipe\msagent_1

  • polling_time

    10000

  • port_number

    4444

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDX0bN+QUD6ViwJ5Zy/7/iL9rqi0RBbHtNsiRoUU7k/yyCVe6hXvGz1JycOjMpfjycTc1V5mOWwwXtX+IGCx7zjYkvkYeKGD4t+3yf7Tbu8LkiVSJcQl1lhTsuNg5ZFabkbR73nIx2C6DBWr3hy+CX0055QbzEDlhIS5znrDDXyiwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • watermark

    100000

Signatures

  • Cobaltstrike family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • b9058796ff99c43c664cbbd9cd2d05b04d902f4ef5023d97577aec2ac69dbe7e
    .dll windows:5 windows x64

    68ecdba3295868c3633731b8147138b7


    Headers

    Imports

    Exports

    Sections