General

  • Target

    e41545ba71ca5375e1ff017a577061a8da217ad9b072bb910cae3ef5b8701158

  • Size

    259KB

  • Sample

    231012-ekjc6ade71

  • MD5

    38d0ad893cb37ad7ec311243f685dbc5

  • SHA1

    1d8689ad821733dce5d56c3fd022a9479ab9732c

  • SHA256

    e41545ba71ca5375e1ff017a577061a8da217ad9b072bb910cae3ef5b8701158

  • SHA512

    4037e689070cfac5ce7388ee752fab7c37dc85f13244b47dac9913ec008f7bab5ae10725325a44a7136bea954eb576dba7912cc7aaa7051a8accc797abf75179

  • SSDEEP

    6144:uJqVG5d1IpMyibgkTZI6jHID90ac4BXmH/:u3d6tevoxvBXA

Score
10/10

Malware Config

Extracted

Family

cobaltstrike

Botnet

100000

C2

http://1.116.127.12:9999/IE9CompatViewList.xml

Attributes
  • access_type

    512

  • host

    1.116.127.12,/IE9CompatViewList.xml

  • http_header1

    AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_header2

    AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_method1

    GET

  • http_method2

    POST

  • polling_time

    60000

  • port_number

    9999

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCYlWof3phxyz7RiiFjZh8lfZSbNe/iYAtSdqLEn+dPX3IqyMyw31PFB5hrXbmSE0NOhkyIs/RSO2NmWFhmAe6Zr41TyvSCXMBEpmjyPHA8KAw5ikTDLwaSmAI+wWwHsYSGJTZHx0avH7FrSMfgZEPF+31x7MktGO6YrnAgCEBr5QIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /submit.php

  • user_agent

    Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30)

  • watermark

    100000

Targets

    • Target

      e41545ba71ca5375e1ff017a577061a8da217ad9b072bb910cae3ef5b8701158

    • Size

      259KB

    • MD5

      38d0ad893cb37ad7ec311243f685dbc5

    • SHA1

      1d8689ad821733dce5d56c3fd022a9479ab9732c

    • SHA256

      e41545ba71ca5375e1ff017a577061a8da217ad9b072bb910cae3ef5b8701158

    • SHA512

      4037e689070cfac5ce7388ee752fab7c37dc85f13244b47dac9913ec008f7bab5ae10725325a44a7136bea954eb576dba7912cc7aaa7051a8accc797abf75179

    • SSDEEP

      6144:uJqVG5d1IpMyibgkTZI6jHID90ac4BXmH/:u3d6tevoxvBXA

    Score
    1/10

MITRE ATT&CK Matrix

Tasks