General

  • Target

    413bff37f1508851f1956c8c678f7cabb5a01b83745954be317b111268b859f8

  • Size

    7.6MB

  • MD5

    b047d16770d3e3f667c1c63540e0d652

  • SHA1

    861ab6afd6c8564ee75fe5d4bcc69d0893f8fd25

  • SHA256

    413bff37f1508851f1956c8c678f7cabb5a01b83745954be317b111268b859f8

  • SHA512

    a35288e4dccddb7f695aec2105d546daf2fb2566c1f0f04bee5ed4fb9b2bf5931620efca56f1deebe35e7ff92b74f97c38d8f49f5ea818cbf49c13ab37a77ae1

  • SSDEEP

    196608:FeeD1BVhKuWJysVYvsO5mDIEVFKgd7bawoxIDPXV+1:QejVBWJOmDIEBd7yxuPQ

Malware Config

Extracted

Family

cobaltstrike

C2

http://192.168.2.121:36981/jquery-3.3.2.slim.min.js

Attributes
  • user_agent

    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Referer: http://code.jquery.com/ Accept-Encoding: gzip, deflate User-Agent: Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko

Signatures

  • Cobaltstrike family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 413bff37f1508851f1956c8c678f7cabb5a01b83745954be317b111268b859f8
    .exe windows:5 windows x64

    7320b3cae0f7c7e579e85728a091f04b


    Headers

    Imports

    Sections

  • bypass1.pyc