General

  • Target

    543cc37b5010a62b76a15a80540a8c6fdc63e313863e6d0b7791fdffa19af6b2

  • Size

    203KB

  • MD5

    0c24cde711c859a0779c98495e6db739

  • SHA1

    cde5ab9a927e9be986c90b6d80cc5bfc6916d978

  • SHA256

    543cc37b5010a62b76a15a80540a8c6fdc63e313863e6d0b7791fdffa19af6b2

  • SHA512

    e60570cc295c309d28308c9b330a701f692d8a03cb816184027b4c8fac629aa21b153984eb79da6245d0048b655cb0dda6002dcc1c628db2fbc627572b2c7d97

  • SSDEEP

    3072:PGfpVbhIoHE8ConnRVSEDlAZk1GkZX5aWWjEU0Z5IWFE/:ObhIok8ConR5hAQ5atjctE

Score
10/10

Malware Config

Extracted

Family

cobaltstrike

Botnet

100000

Attributes
  • beacon_type

    1024

  • host

    192.168.183.128

  • http_header1

    AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_header2

    AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • polling_time

    10000

  • port_number

    6666

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDabItIKqA2lxr4XuG1GIkQykzYfu6m5ooWRAcqul7qPRf4bERxPRN0qsi+eudidk7ofh+6HbiRv7U3RDPcN6EguFk/nFL3dEccWFeh1EnzzW9G7Q/Kl2oX+FLKb/h/f5xBCLiAT1WGjQtBBugv0M+lDALwNI/9YfSv222HrAiGLwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • watermark

    100000

Signatures

  • Cobalt Strike reflective loader 1 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 543cc37b5010a62b76a15a80540a8c6fdc63e313863e6d0b7791fdffa19af6b2
    .dll windows:5 windows x86

    084fc7d005fd54ae1fdd1d415e9e69a3


    Headers

    Imports

    Exports

    Sections