General

  • Target

    c513ebc530a9dce3f42131047abe02397966e2ea33f4bde231413fcdcfc07292

  • Size

    208KB

  • Sample

    231018-zvr39sbb8t

  • MD5

    ba3bd1cf9f4559c81c7793acc96175ac

  • SHA1

    7b95f4409fcb3ed57c8f32c8103ed650b1059d3d

  • SHA256

    c513ebc530a9dce3f42131047abe02397966e2ea33f4bde231413fcdcfc07292

  • SHA512

    14d7777fe3c694ec0001f4f9827fd08b52ff9234c670649ee21b16c1d943880ab40f780821f4d65d56e838a22cf358e99ec60ed98ca3c025c4fbd583a2f83be2

  • SSDEEP

    3072:LI6CqRCxffkClZ8Ccn7LQlRw6x+Y3CxT2DtK5jdUjY5vQ:LIDff9D8C6XYRw6MT2DEj

Score
10/10

Malware Config

Extracted

Family

cobaltstrike

Botnet

100000

C2

http://124.112.238.15:1314/dot.gif

Attributes
  • access_type

    512

  • host

    124.112.238.15,/dot.gif

  • http_header1

    AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_header2

    AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_method1

    GET

  • http_method2

    POST

  • polling_time

    60000

  • port_number

    1314

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDJNePT+xvglCI7DQz7bxNzCI4VUeLx6UftmIcEnbqI2/2bFUZ+cyN8Uhj9PVb4m26Hf27S2GjMJ6HnCaWiPfeS5YtmnO6P1vR8FFaVNcylAc8oXvegYnHC2g9Z1PkR/J2kTOz066qxHWkvUPly6LmHGOQfAlopWfmvGS90I8vDlwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /submit.php

  • user_agent

    Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727)

  • watermark

    100000

Targets

    • Target

      c513ebc530a9dce3f42131047abe02397966e2ea33f4bde231413fcdcfc07292

    • Size

      208KB

    • MD5

      ba3bd1cf9f4559c81c7793acc96175ac

    • SHA1

      7b95f4409fcb3ed57c8f32c8103ed650b1059d3d

    • SHA256

      c513ebc530a9dce3f42131047abe02397966e2ea33f4bde231413fcdcfc07292

    • SHA512

      14d7777fe3c694ec0001f4f9827fd08b52ff9234c670649ee21b16c1d943880ab40f780821f4d65d56e838a22cf358e99ec60ed98ca3c025c4fbd583a2f83be2

    • SSDEEP

      3072:LI6CqRCxffkClZ8Ccn7LQlRw6x+Y3CxT2DtK5jdUjY5vQ:LIDff9D8C6XYRw6MT2DEj

    Score
    3/10

MITRE ATT&CK Matrix

Tasks