General

  • Target

    b191737e3e70a6430d6827bc10fe55bd

  • Size

    221KB

  • MD5

    b191737e3e70a6430d6827bc10fe55bd

  • SHA1

    6b8fa51a117196b6931e3f4c3f866d7d3bd1cd94

  • SHA256

    72e8bc12f384636fc86ced4c1d53f584e9ad4b6acd29748a59845e9cb631ff60

  • SHA512

    f52fcc19202a718a8c6f15e6c6cc90e6dea916906de5902c7206448a68c9d3642a42413ad4aac1c1f2e9ed5d9e22fa96c290bd746471e5a0a3b0ef9bc8d604a2

  • SSDEEP

    6144:B3GY5Xkg8xJ2ujEHt2GQjomoE6otd9d+9HkNgnT8RyOch:dkxJxjEQG3mhd9d+9WQV

Malware Config

Extracted

Family

cobaltstrike

Botnet

2113494451

C2

http://www.bankrate.com:443/Collector/2.0/settings/

Attributes
  • access_type

    512

  • beacon_type

    2048

  • host

    www.bankrate.com,/Collector/2.0/settings/

  • http_header1

    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

  • http_header2

    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

  • http_method1

    GET

  • http_method2

    GET

  • jitter

    10496

  • polling_time

    10000

  • port_number

    443

  • sc_process32

    %windir%\syswow64\logman.exe

  • sc_process64

    %windir%\sysnative\logman.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCnNfstn/5qmvXWQ2XI0ZGgRN476WLnejJ8ozhtm8E4w9OD5zHTkOSjiuQBovCrDjrv6Fyixj/wHne3i35QEVW2scJ+9AV8rtE0xX+Gd2fPaTtMNel995XMgy0DOOUAaCitcnRSHk0QKd5TEdrJ9s93jMgOgt6P30nVV6OQydtBywIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    2.952798208e+09

  • unknown2

    AAAABAAAAAEAAAAuAAAAAgAAAIIAAAAIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown3

    1.610612736e+09

  • uri

    /users/8:orgid:b1a28-a1c3-3d54-4eb01adb1/endpoints/events/poll

  • user_agent

    Microsoft Office/16.0 (Windows NT 10.0; Microsoft Excel 16.0.10827; Pro)

  • watermark

    2113494451

Signatures

  • Cobaltstrike family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • b191737e3e70a6430d6827bc10fe55bd
    .exe windows:4 windows x86 arch:x86

    829da329ce140d873b4a8bde2cbfaa7e


    Headers

    Imports

    Sections