General

  • Target

    5d37d6cd6d359cbdbda2cc7bad141a7f

  • Size

    270KB

  • MD5

    5d37d6cd6d359cbdbda2cc7bad141a7f

  • SHA1

    df23bae4a6270b23f58719d8601845268d7d2c03

  • SHA256

    ab13f819640599a62575b5d999fb530d8f1baf12d2b40cac533171420e6ac647

  • SHA512

    934740037fea7ab073d14a5cc6d6a0bfadde6a728770bab75cc176f5aa861344b57c46b8d2f9491ab6bfc17e16379cfe6060d31da473825ef3da76b3e1cfe0eb

  • SSDEEP

    6144:F+JUbzEqVsscqWvrxXB2YFB1LmhiinmJF15s7:Fsczxs2WzxXBVFB1L5Cmn87

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

cobaltstrike

Botnet

0

Attributes
  • beacon_type

    4096

  • http_header1

    AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_header2

    AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • polling_time

    10000

  • port_number

    42978

  • sc_process32

    %windir%\syswow64\dllhost.exe

  • sc_process64

    %windir%\sysnative\dllhost.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCIZQW2ssrE0i8vjjKm/eXoY0rSpQy+l89B9vg39dP8T7kMKlITXpifmyVZ2hNt6DnZAdyQ7fyHiCkbnu9s+Rb2a1GSTmi+y+DodaMYK/NU0dWA6+hawikl/InlYiRsvoxD42pM5sPTUkohcDxc2+dAytb+NT3+/xCyJ7N5+6bI6QIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • watermark

    0

Signatures

  • Cobaltstrike family
  • Metasploit family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5d37d6cd6d359cbdbda2cc7bad141a7f
    .dll windows:5 windows x86 arch:x86

    9d9fd850ae414cf4cef6e0521cddb88d


    Headers

    Imports

    Exports

    Sections