General
-
Target
18f2221234ffb98dd9c32dcc74a136e0bf6d25a1a1912ccd10484a59d6ff1827_JC.exe
-
Size
208KB
-
Sample
231012-2apthsfc49
-
MD5
1921fb7487555cb041fd6c1874a8be10
-
SHA1
054a1e47e86cab4e1d3b2b013f51b231ee8760da
-
SHA256
18f2221234ffb98dd9c32dcc74a136e0bf6d25a1a1912ccd10484a59d6ff1827
-
SHA512
050fa599379b8cc1a12f49180b8db24ac20d82a801e7e206b8c1c7c8507d086b21a99889a70ab35181dc7ff64a95e054fbae2d52d7daff7366e37328376da857
-
SSDEEP
3072:LI6CqRCxffkClZ8Ccn7LQlRw6x+Y3CxT2DtK5jdU1Y5HI:LIDff9D8C6XYRw6MT2DEjY
Behavioral task
behavioral1
Sample
18f2221234ffb98dd9c32dcc74a136e0bf6d25a1a1912ccd10484a59d6ff1827_JC.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
18f2221234ffb98dd9c32dcc74a136e0bf6d25a1a1912ccd10484a59d6ff1827_JC.dll
Resource
win10v2004-20230915-en
Malware Config
Extracted
cobaltstrike
100000
http://156.245.19.127:8443/en_US/all.js
-
access_type
512
-
beacon_type
2048
-
host
156.245.19.127,/en_US/all.js
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
polling_time
60000
-
port_number
8443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCdoQ0iOpqDMpnHN1Qom1yP4K6FqSnxQ/RhhMwHF0bYvzTTcjje94MttyXuLxbMqGKFA6TPizLbyroWGa8g4NKPfv1LdHd1uZhzfZbcVPqb13zrMhe+Q0PcIyOqaYOIYnEatrSt54P5jbRbpZ3aSc2m/ElA4ncg4afxzPRgA4p60wIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; InfoPath.2; InfoPath.3)
-
watermark
100000
Targets
-
-
Target
18f2221234ffb98dd9c32dcc74a136e0bf6d25a1a1912ccd10484a59d6ff1827_JC.exe
-
Size
208KB
-
MD5
1921fb7487555cb041fd6c1874a8be10
-
SHA1
054a1e47e86cab4e1d3b2b013f51b231ee8760da
-
SHA256
18f2221234ffb98dd9c32dcc74a136e0bf6d25a1a1912ccd10484a59d6ff1827
-
SHA512
050fa599379b8cc1a12f49180b8db24ac20d82a801e7e206b8c1c7c8507d086b21a99889a70ab35181dc7ff64a95e054fbae2d52d7daff7366e37328376da857
-
SSDEEP
3072:LI6CqRCxffkClZ8Ccn7LQlRw6x+Y3CxT2DtK5jdU1Y5HI:LIDff9D8C6XYRw6MT2DEjY
Score3/10 -