General
-
Target
6ddab329a3cb6561417aa1bcb7be179dcd0eb87a813f1f9c73e427a9993045cc
-
Size
208KB
-
Sample
231013-djjf4adf62
-
MD5
1a54c96f762bed7e0fb9a0ac050cebc4
-
SHA1
f66bb3fd31fcf9a88746834f148b7f502e5bacfd
-
SHA256
6ddab329a3cb6561417aa1bcb7be179dcd0eb87a813f1f9c73e427a9993045cc
-
SHA512
e2539cb3b0cb388bf1d3ecd40b3d5b46d900040ec9f331ac4ac9b3ef6a65b9f622a335b069f67c66f7e97af661a0b9154769dbabb6e88310502a41da690ed534
-
SSDEEP
3072:LI6CqRCxffkClZ8Ccn7LQlRw6x+Y3CxT2DtK5jdUsY5R:LIDff9D8C6XYRw6MT2DEj
Behavioral task
behavioral1
Sample
6ddab329a3cb6561417aa1bcb7be179dcd0eb87a813f1f9c73e427a9993045cc.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6ddab329a3cb6561417aa1bcb7be179dcd0eb87a813f1f9c73e427a9993045cc.dll
Resource
win10v2004-20230915-en
Malware Config
Extracted
cobaltstrike
100000
http://cs45upb230906.iqiyid.com:2053/en_US/all.js
-
access_type
512
-
beacon_type
2048
-
host
cs45upb230906.iqiyid.com,/en_US/all.js
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
polling_time
60000
-
port_number
2053
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCIyy0t4QrslY86iUSdUAv9K6MUiMjKrINeBmrJoHx2zSwtN7ja0N7gg8nrfzf1xLmvGK4zJZnp59J6zWOkWqOAxI9uLmZ/JsGTqMZclfhBFYmq4ORY/4HgXKUAiF3QsIcpLAFWbJ6EhUsn9v8k3Vfbr3DBvDmgGlCeG80otBLRnwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; Trident/4.0)
-
watermark
100000
Targets
-
-
Target
6ddab329a3cb6561417aa1bcb7be179dcd0eb87a813f1f9c73e427a9993045cc
-
Size
208KB
-
MD5
1a54c96f762bed7e0fb9a0ac050cebc4
-
SHA1
f66bb3fd31fcf9a88746834f148b7f502e5bacfd
-
SHA256
6ddab329a3cb6561417aa1bcb7be179dcd0eb87a813f1f9c73e427a9993045cc
-
SHA512
e2539cb3b0cb388bf1d3ecd40b3d5b46d900040ec9f331ac4ac9b3ef6a65b9f622a335b069f67c66f7e97af661a0b9154769dbabb6e88310502a41da690ed534
-
SSDEEP
3072:LI6CqRCxffkClZ8Ccn7LQlRw6x+Y3CxT2DtK5jdUsY5R:LIDff9D8C6XYRw6MT2DEj
Score3/10 -