General
-
Target
387703b62dba8863a3449fd4bb7d8639
-
Size
303KB
-
Sample
231231-qz8gdahaa5
-
MD5
387703b62dba8863a3449fd4bb7d8639
-
SHA1
b16ed30039100c34fb703bcd99da1f3675f5e24f
-
SHA256
20bb857e304266440702554128866f3de722a1a5e0dfaa171c902dd3ae1acfd5
-
SHA512
21483dc78826fa8ef13147c534e10db26ed8e0c344cbac4ec6b7ef3f7bac39d97230cd2bd4ca4e0fb18e3559d2191c67e55d92637c193e4ad0a986e4baaf0300
-
SSDEEP
6144:IM3tTJUNEubcIMNjiKE590HO3KKy0pHODLwreA1:ONVbMoOO6KykuQreI
Static task
static1
Behavioral task
behavioral1
Sample
387703b62dba8863a3449fd4bb7d8639.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
387703b62dba8863a3449fd4bb7d8639.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
cobaltstrike
0
http://82.118.22.221:50215/activity
-
access_type
512
-
beacon_type
2048
-
host
82.118.22.221,/activity
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
polling_time
60000
-
port_number
50215
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCMySPNcE6BMcAEoZh0MgWv+Xwwhvx6atn5W4jNUVYTOmw8nIjfsjhzZJAJeba0rB6y2kNTfePppwgxk2eryCoTwQEA9gLqSsZYRygjHUDd9XGcH6sPm2rf1UJXGO8swd/USksDeNQos8Y/N1gIMXs1XWd8ZFqpir9PY3xUEdxRSwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; WOW64; Trident/6.0; Touch)
-
watermark
0
Targets
-
-
Target
387703b62dba8863a3449fd4bb7d8639
-
Size
303KB
-
MD5
387703b62dba8863a3449fd4bb7d8639
-
SHA1
b16ed30039100c34fb703bcd99da1f3675f5e24f
-
SHA256
20bb857e304266440702554128866f3de722a1a5e0dfaa171c902dd3ae1acfd5
-
SHA512
21483dc78826fa8ef13147c534e10db26ed8e0c344cbac4ec6b7ef3f7bac39d97230cd2bd4ca4e0fb18e3559d2191c67e55d92637c193e4ad0a986e4baaf0300
-
SSDEEP
6144:IM3tTJUNEubcIMNjiKE590HO3KKy0pHODLwreA1:ONVbMoOO6KykuQreI
Score10/10 -