General

  • Target

    56991f905987297e06680f71ef6e6ba7

  • Size

    221KB

  • MD5

    56991f905987297e06680f71ef6e6ba7

  • SHA1

    45714f4bc04f078b269738cefbf1912d556f858f

  • SHA256

    02f75d4641e481bae5dc9470b8da3b700616bc57573fb2eedf468677836cd956

  • SHA512

    3bd910f0581b3b18619301a0b01b91811caf1b91c9435210db6b9fd8d1fc6c02a19021f8d79031a1542426df9764b4d5831ce801ef58fde99839d3aa88fbac3c

  • SSDEEP

    3072:dnT2RRXuwcN3OQXB8CITr9VV2ILe126JyTuBdjdUo/Z5AQj:dwXupN1x8CgBbRLDTuLjp

Score
10/10

Malware Config

Extracted

Family

cobaltstrike

Botnet

755154920

C2

http://api.yelp.com:443/mail/u/0/#inbox

Attributes
  • access_type

    512

  • beacon_type

    2048

  • host

    api.yelp.com,/mail/u/0/#inbox

  • http_header1

    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

  • http_header2

    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

  • http_method1

    GET

  • http_method2

    POST

  • jitter

    24832

  • polling_time

    14

  • port_number

    443

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCTpkTmiqrzJI/pHm6vRZqLc1jM/dZKxC8xOmm3fb7i8fQVikJfeBxSURkBX7whXD9a/Qpsc4X9VIBQ+0ZMxhFXzDQPQc8UAdEGZuiR8ep9o95d0ctD5PZYi4B4gx/5KjcaTgffnTIqyt8n9dfYL+wo/Cs8Vf/NIQ15te+73J/wkwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /mail/u/1/

  • user_agent

    Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0; MALC)

  • watermark

    755154920

Signatures

  • Cobaltstrike family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 56991f905987297e06680f71ef6e6ba7
    .exe windows:4 windows x86 arch:x86

    829da329ce140d873b4a8bde2cbfaa7e


    Headers

    Imports

    Sections