General

  • Target

    03670fc52aa24fa82d2fdf0178b3d76f

  • Size

    220KB

  • Sample

    231229-zfr5qaedhp

  • MD5

    03670fc52aa24fa82d2fdf0178b3d76f

  • SHA1

    d308cc32317c3caacaf9305bd7569f55561a8582

  • SHA256

    b620e1d6736e5951a319a1af7e17d77f46929d200532dbee0d41b15f4318fc7d

  • SHA512

    933cbbc21913737f378d5001e9ae825b50af4d53390493d0941b4cb9b48d77d300e226093fda3fe0953adaa3dbe84ba5bb55e9bedd9198e6ca984e0acd06907f

  • SSDEEP

    3072:Lty6NsDIS+V7ZDIMugN/HsdI6mwTk1Z02rdS74ljurtFat03xLVhOdnJK/wJ0E:oLDl8lIE/KTk1vljoFat03dWJe9E

Malware Config

Extracted

Family

cobaltstrike

Botnet

1891653558

C2

http://r.wlthplum.com:443/_/scs/mail-static/_/js/

Attributes
  • access_type

    512

  • beacon_type

    2048

  • host

    r.wlthplum.com,/_/scs/mail-static/_/js/

  • http_header1

    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

  • http_header2

    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

  • http_method1

    GET

  • http_method2

    POST

  • jitter

    3840

  • polling_time

    60000

  • port_number

    443

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCdfFN96OO0VNSUoASea3uFN2AhgOzDc1DUZQGzu92j2qlKpBvuVWdPyIcE7CAFIaboGTs3ShEDKoHB7jKrjlA0phYo+l7LQ80HNV3PGydZMndbLAtjRNtVRpbMnbM0RQgcMtMKw9Kvk5ulo2roQ1yZpyGEvZgWwIxxmMYaY7zd1QIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    5.37071616e+08

  • unknown2

    AAAABAAAAAEAAAF3AAAAAQAAAPoAAAACAAAABAAAAAIAAAAcAAAAAgAAACQAAAACAAAAEgAAAAIAAAAEAAAAAgAAABwAAAACAAAAJAAAAAIAAAARAAAAAgAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /mail/u/0/

  • user_agent

    Mozilla/5.0 (compatible, MSIE 11, Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko

  • watermark

    1891653558

Targets

    • Target

      03670fc52aa24fa82d2fdf0178b3d76f

    • Size

      220KB

    • MD5

      03670fc52aa24fa82d2fdf0178b3d76f

    • SHA1

      d308cc32317c3caacaf9305bd7569f55561a8582

    • SHA256

      b620e1d6736e5951a319a1af7e17d77f46929d200532dbee0d41b15f4318fc7d

    • SHA512

      933cbbc21913737f378d5001e9ae825b50af4d53390493d0941b4cb9b48d77d300e226093fda3fe0953adaa3dbe84ba5bb55e9bedd9198e6ca984e0acd06907f

    • SSDEEP

      3072:Lty6NsDIS+V7ZDIMugN/HsdI6mwTk1Z02rdS74ljurtFat03xLVhOdnJK/wJ0E:oLDl8lIE/KTk1vljoFat03dWJe9E

MITRE ATT&CK Matrix

Tasks