General
-
Target
b73189a0149674d13f2c16d32d4d782ef763905230679141a3fe0ced30d36687
-
Size
573KB
-
Sample
231022-jnzxjaec71
-
MD5
167a4369d5b856a705fe782f7cf13a6b
-
SHA1
d2c5d7d0680e96b7906623dd1043efeba30d0057
-
SHA256
b73189a0149674d13f2c16d32d4d782ef763905230679141a3fe0ced30d36687
-
SHA512
44c7cc40edf1edd3b3a665014f88408bd1e28db2ecad317c318cfd79e888345a11526ee1e06589a764513c488dac1e5282bd7e8bb369a60dac740c21401082ef
-
SSDEEP
12288:1YrcMgsXttlOXHRswk3Ta77Hp0fWAUmBJm4l1NvYF/VqoXW:11nsXttIbiNvYF/VqoXW
Static task
static1
Behavioral task
behavioral1
Sample
b73189a0149674d13f2c16d32d4d782ef763905230679141a3fe0ced30d36687.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
b73189a0149674d13f2c16d32d4d782ef763905230679141a3fe0ced30d36687.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
cobaltstrike
1873433027
http://101.43.12.111:9999/ga.js
-
access_type
512
-
host
101.43.12.111,/ga.js
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
polling_time
60000
-
port_number
9999
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCK3j1QiFPITUraY40sh00GqcwT6dYusp8JQ0Tm9arCWRgbjdY1s3MmZ8jz2c6gS5PUWLPhn5TgqRdD+YSw4m7AvYpWDGHufmWRflYFKTZDr9G+BhHyW3w5TZwnVHmxYfsKN5V8tLfd5u7DeNYHSREKaZeIQDBu97WefxyKwdmJIwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; FunWebProducts)
-
watermark
1873433027
Targets
-
-
Target
b73189a0149674d13f2c16d32d4d782ef763905230679141a3fe0ced30d36687
-
Size
573KB
-
MD5
167a4369d5b856a705fe782f7cf13a6b
-
SHA1
d2c5d7d0680e96b7906623dd1043efeba30d0057
-
SHA256
b73189a0149674d13f2c16d32d4d782ef763905230679141a3fe0ced30d36687
-
SHA512
44c7cc40edf1edd3b3a665014f88408bd1e28db2ecad317c318cfd79e888345a11526ee1e06589a764513c488dac1e5282bd7e8bb369a60dac740c21401082ef
-
SSDEEP
12288:1YrcMgsXttlOXHRswk3Ta77Hp0fWAUmBJm4l1NvYF/VqoXW:11nsXttIbiNvYF/VqoXW
Score10/10 -