General
-
Target
2023-08-26_b99ea5d7e562bcaee033389516829f0f_cobalt-strike_cobaltstrike_JC.exe
-
Size
553KB
-
Sample
231011-gey8jace6y
-
MD5
b99ea5d7e562bcaee033389516829f0f
-
SHA1
51de58a40ac80121ae596d3cca8a302d457c81c0
-
SHA256
ea443cce5aad3f3c21436965d09050e1c56c2e25f86474b7339c86c5330456c6
-
SHA512
506a4e580b4bc2064f6a563bb399ee316629452f31ed29c60fa031b94c20f68a3b10d69f134672df8e92e0938e94067222a8dbefc2b1fbcb665a6c3425490a0c
-
SSDEEP
6144:f6kFWCrd/UIzqwYiUz0d/oh2fYD4ktiD8UI8I6hG+6AshnifujPOr9aV4:f6sWCreyUzmooA9tiDZ7Zxl0ifujmZ
Behavioral task
behavioral1
Sample
2023-08-26_b99ea5d7e562bcaee033389516829f0f_cobalt-strike_cobaltstrike_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2023-08-26_b99ea5d7e562bcaee033389516829f0f_cobalt-strike_cobaltstrike_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
cobaltstrike
391144938
http://124.222.57.223:8081/static/js/jquery3.2.1.js
-
access_type
512
-
host
124.222.57.223,/static/js/jquery3.2.1.js
-
http_header1
AAAABwAAAAAAAAANAAAAAgAAAA1QSFBTRVNTSU9OSUQ9AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAABwAAAAAAAAADAAAADwAAAAsAAAACAAAABXVzZXI9AAAAAQAAAAIlJQAAAAYAAAAGQ29va2llAAAABwAAAAEAAAADAAAADwAAAA0AAAACAAAABWRhdGE9AAAAAQAAAAIlJQAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
jitter
1792
-
polling_time
3000
-
port_number
8081
-
sc_process32
c:\windows\syswow64\rundll32.exe
-
sc_process64
c:\windows\system32\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDNJxrT8HE+0KsqgYU89hfVf2khbl1/vXzEXimwRjYaInkqEepZiTEdGPnKFIJW1r1Y3R+WlUvHr2hhr0+LUI9wf9dr7W3M9is7O6yZRC/EYnrgF/bdpbUzNHVr3u8UMKnyEWcyFS2w2Q6Q6ehMthmXmOIdvFGnapNPIayDcye2HwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
2.181046272e+09
-
unknown2
AAAABAAAAAEAAAAXAAAAAgAAAGMAAAAIAAAADwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/static/js/submit.js
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/180.571.0.99 Safari/537.36
-
watermark
391144938
Targets
-
-
Target
2023-08-26_b99ea5d7e562bcaee033389516829f0f_cobalt-strike_cobaltstrike_JC.exe
-
Size
553KB
-
MD5
b99ea5d7e562bcaee033389516829f0f
-
SHA1
51de58a40ac80121ae596d3cca8a302d457c81c0
-
SHA256
ea443cce5aad3f3c21436965d09050e1c56c2e25f86474b7339c86c5330456c6
-
SHA512
506a4e580b4bc2064f6a563bb399ee316629452f31ed29c60fa031b94c20f68a3b10d69f134672df8e92e0938e94067222a8dbefc2b1fbcb665a6c3425490a0c
-
SSDEEP
6144:f6kFWCrd/UIzqwYiUz0d/oh2fYD4ktiD8UI8I6hG+6AshnifujPOr9aV4:f6sWCreyUzmooA9tiDZ7Zxl0ifujmZ
Score10/10 -