General
-
Target
2b3b97a1c8875df0de7f03a2697745bf2a98668081403d57bdfd21b87c8300c0.bin.sample.gz
-
Size
127KB
-
Sample
240122-nqzrrsfbcq
-
MD5
a46fde6671fa714a4ee371ec087ef44e
-
SHA1
854d21bfc3384d72d0cc080b79c649f208f5951b
-
SHA256
27a0307954c728dd73129dfe600962b04f754564e753a5912e1d145646fd0b79
-
SHA512
ba703d5b190e294fd8b30a15c64e4325936ba42b57b7fdd98c5c88a954fa653d3c30b74a871ceda539a7b4f2609d8487aadbd202a646d1ef3d88d7d384aaf6f6
-
SSDEEP
3072:N4u6dk9SD9gw24EA/OqNyXdSQOL/lVr3YuIA3LqFMe:56dk9SxPAA/XNytETlVkuIML4
Behavioral task
behavioral1
Sample
sample.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
sample.dll
Resource
win10v2004-20231215-en
Malware Config
Extracted
cobaltstrike
305419896
http://185.202.0.111:80/updates.rss
-
access_type
512
-
host
185.202.0.111,/updates.rss
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
polling_time
60000
-
port_number
80
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDCT42RZXDkOt4TBaANg7RggQbQZgKIt9JoHuhWGb5HcZdWd3ZmoqFQuFJ53NsjMvGrDkwxGokAV2GaGhCCb1GHK1NigI6uBcokE6seiXhny94nDmEEu4EEdYyFgLrsswJ04NA8tnIQD11iUz7XxzwocHN1161Yj66YCBK61DUomQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0; Trident/5.0; BOIE9;ENUS)
-
watermark
305419896
Targets
-
-
Target
sample
-
Size
254KB
-
MD5
2f606bca6b7ca76a2aadbd8f7be756c2
-
SHA1
c8b6d7a14cd0b91525f5a75d70f48ec0e911b079
-
SHA256
2b3b97a1c8875df0de7f03a2697745bf2a98668081403d57bdfd21b87c8300c0
-
SHA512
cf3efe8288a3c58a2b157085d8e97f3ab4c334435cf7a362598660cae95b0d66b626543e77dc90d70ce931e22602a5d99ca729b4817c3188b717432feca04ec7
-
SSDEEP
3072:TJwpS2NACV4qAbypuljJGnJYoTjqETdtbsnOfFwXVa/O494YJGaXMmhHnaH:TJwpYVNcn3pTdNe+WXVil4u7H
Score1/10 -