General

  • Target

    4b281124a6c20014cbd63c6ddc0428dce2be3cb1e8da41f398da30fc1f47a8ee

  • Size

    259KB

  • Sample

    231014-rm3k2afc2s

  • MD5

    a8b88261cb2081afa6abdc48868b5c25

  • SHA1

    08373c071eb95d2c34d5cff228ee8ea4c6718208

  • SHA256

    4b281124a6c20014cbd63c6ddc0428dce2be3cb1e8da41f398da30fc1f47a8ee

  • SHA512

    7a3af96247e2e78db0ca756040be06d966a1541ba659e55ece1a420889131cbabf3e4d3700a5021c2ceaeb05abe5e1c5996172f654d5c4797e7e1ca2d8b509a3

  • SSDEEP

    6144:uJqVG5d1IpMyibgkTZI6jHID90aTBXHH/:u3d6tevoxjBX/

Score
10/10

Malware Config

Extracted

Family

cobaltstrike

Botnet

100000

C2

http://8.146.211.152:13344/en_US/all.js

Attributes
  • access_type

    512

  • host

    8.146.211.152,/en_US/all.js

  • http_header1

    AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_header2

    AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_method1

    GET

  • http_method2

    POST

  • polling_time

    60000

  • port_number

    13344

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDPeMEloSL1UfXeR3cJH8yEldHyZwBrFKm5UNOEV+dnelKXTHWsbUWEGfvhzvvbEGlFxOrORPMU1HmaqlblIwTbJCU0CKrocbvqJf4vMc+GYY1rQuVod/xm9CdOolr1N0XQUjC9qjm6/j3a2Ezi1TT6UZ3TpqUehy/n6VWSMQ5m9QIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /submit.php

  • user_agent

    Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727)

  • watermark

    100000

Targets

    • Target

      4b281124a6c20014cbd63c6ddc0428dce2be3cb1e8da41f398da30fc1f47a8ee

    • Size

      259KB

    • MD5

      a8b88261cb2081afa6abdc48868b5c25

    • SHA1

      08373c071eb95d2c34d5cff228ee8ea4c6718208

    • SHA256

      4b281124a6c20014cbd63c6ddc0428dce2be3cb1e8da41f398da30fc1f47a8ee

    • SHA512

      7a3af96247e2e78db0ca756040be06d966a1541ba659e55ece1a420889131cbabf3e4d3700a5021c2ceaeb05abe5e1c5996172f654d5c4797e7e1ca2d8b509a3

    • SSDEEP

      6144:uJqVG5d1IpMyibgkTZI6jHID90aTBXHH/:u3d6tevoxjBX/

    Score
    1/10

MITRE ATT&CK Matrix

Tasks