General

  • Target

    2c4d83ee96d133c698b45b96241c8a0b7e8fe9a06480232917c8a07a2dd346e0

  • Size

    259KB

  • Sample

    231011-jtsqeace94

  • MD5

    84d17c148b5d6d1c0cd278680cdd5b01

  • SHA1

    1dd1f06f990a998f4b6d76486606c8e60407e2fb

  • SHA256

    2c4d83ee96d133c698b45b96241c8a0b7e8fe9a06480232917c8a07a2dd346e0

  • SHA512

    37f714b2129cddbb64e33d238b977a07ded8247f0474c156dc3ec2c38dcf9d866e374038fb47238d57287b4b3c4948a982486833439c039b9aff905f93a402f1

  • SSDEEP

    6144:fJqVG5d1IpMyibgkTZI6jHID90aXBX2H/:f3d6tevoxHBXw

Score
10/10

Malware Config

Extracted

Family

cobaltstrike

Botnet

100000

C2

http://8.130.97.243:50943/updates

Attributes
  • access_type

    512

  • beacon_type

    2048

  • host

    8.130.97.243,/updates

  • http_header1

    AAAABwAAAAAAAAALAAAAAgAAAAV1c2VyPQAAAAYAAAAGQ29va2llAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_header2

    AAAACgAAABJBY2NlcHQ6IHRleHQvcGxhaW4AAAAKAAAAFkFjY2VwdC1MYW5ndWFnZTogZW4tdXMAAAAKAAAAG0FjY2VwdC1FbmNvZGluZzogdGV4dC9wbGFpbgAAAAoAAAAvQ29udGVudC1UeXBlOiBhcHBsaWNhdGlvbi94LXd3dy1mb3JtLXVybGVuY29kZWQAAAAHAAAAAAAAAAgAAAAFAAAAAmlkAAAABwAAAAEAAAADAAAAAgAAADsmb3A9MSZpZD12eGV5a1MmdWk9Sm9zaCBAClBDJnd2PTExJmdyPWJhY2tvZmYmYnY9MS41NSZkYXRhPQAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_method1

    GET

  • http_method2

    POST

  • jitter

    2560

  • polling_time

    5000

  • port_number

    50943

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDg/dArXEf6k4dzhjnyNgcmp3YeRWdNe6ecrPke+Tz08bY36SsT33oXy4KMTQXlhPT8q7owVoEz9M4RfDNifTmxIeMz7CGO4IxrJRxPE7Zu9QSA4nrVYL6Gd3YdKGOeDMvvFbxMX2DYS+J6JoFpGF29rN9aI6KutOlATw1DlJdC4wIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    1.481970944e+09

  • unknown2

    AAAABAAAAAMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /hello/flash.php

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; rv:24.0) Gecko/20100101 Firefox/24.0

  • watermark

    100000

Targets

    • Target

      2c4d83ee96d133c698b45b96241c8a0b7e8fe9a06480232917c8a07a2dd346e0

    • Size

      259KB

    • MD5

      84d17c148b5d6d1c0cd278680cdd5b01

    • SHA1

      1dd1f06f990a998f4b6d76486606c8e60407e2fb

    • SHA256

      2c4d83ee96d133c698b45b96241c8a0b7e8fe9a06480232917c8a07a2dd346e0

    • SHA512

      37f714b2129cddbb64e33d238b977a07ded8247f0474c156dc3ec2c38dcf9d866e374038fb47238d57287b4b3c4948a982486833439c039b9aff905f93a402f1

    • SSDEEP

      6144:fJqVG5d1IpMyibgkTZI6jHID90aXBX2H/:f3d6tevoxHBXw

    Score
    1/10

MITRE ATT&CK Matrix

Tasks