General

  • Target

    Sql.exe

  • Size

    2.1MB

  • Sample

    240201-pxv8lafehj

  • MD5

    a1ebb842ac3f80ef5cfc6f56a8ab91c2

  • SHA1

    b32121c9e1d938c286e03dadce00f09d5fae33a2

  • SHA256

    188127cf401d6566290bc853dcbd490cb4b564c36fee8529ee5dbd84870af254

  • SHA512

    83ed8d697c02843d230f4f97eea2430258c2f0c1b184d672c3a04f231869c8bb203040137e0179e335fc536523a578bc21c21c2b2fc6a4513dac19f381b8569e

  • SSDEEP

    49152:c+oKHdKjzU0H/q0VbNZ63RFeUC7JsS/BkNa:cr7He7ZQOiBo

Malware Config

Extracted

Family

cobaltstrike

Botnet

666666

C2

http://149.104.25.144:6443/dc

Attributes
  • access_type

    512

  • beacon_type

    2048

  • host

    149.104.25.144,/dc

  • http_header1

    AAAABwAAAAAAAAANAAAAAgAAAApTRVNTSU9OSUQ9AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_header2

    AAAABwAAAAAAAAAPAAAACwAAAAIAAAAFdXNlcj0AAAABAAAAAiUlAAAABgAAAARVc2VyAAAABwAAAAEAAAAPAAAADQAAAAIAAAAFZGF0YT0AAAABAAAAAiUlAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_method1

    GET

  • http_method2

    POST

  • jitter

    1792

  • polling_time

    3000

  • port_number

    6443

  • sc_process32

    c:\windows\syswow64\rundll32.exe

  • sc_process64

    c:\windows\system32\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCFudLvuITERmYRv1LvnStQQyAqR1vms9ShxZ2mrDCCMX7HHONu9PhY5+sTR1f90KfqUSnbvuiI5+wQd8GhgF4pZ+8U9zqfcsFdB+QTNlvMZj5b//+w+vmf4kXeRXwH1V6BG9kU9rlDgF+885GlHC0iXMuHTECFb2dwAgLnaZYNBQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    2.51666432e+08

  • unknown2

    AAAABAAAAAEAAAACAAAAAgAAAAUAAAAIAAAADwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /IMXo

  • user_agent

    Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 1.1.4322; BOIE8;ENUS)

  • watermark

    666666

Targets

    • Target

      Sql.exe

    • Size

      2.1MB

    • MD5

      a1ebb842ac3f80ef5cfc6f56a8ab91c2

    • SHA1

      b32121c9e1d938c286e03dadce00f09d5fae33a2

    • SHA256

      188127cf401d6566290bc853dcbd490cb4b564c36fee8529ee5dbd84870af254

    • SHA512

      83ed8d697c02843d230f4f97eea2430258c2f0c1b184d672c3a04f231869c8bb203040137e0179e335fc536523a578bc21c21c2b2fc6a4513dac19f381b8569e

    • SSDEEP

      49152:c+oKHdKjzU0H/q0VbNZ63RFeUC7JsS/BkNa:cr7He7ZQOiBo

MITRE ATT&CK Matrix

Tasks