General

  • Target

    Unconfirmed 757120.crdownload

  • Size

    13.0MB

  • Sample

    240227-lpd3kade66

  • MD5

    e049fd6d80d9285d156cdf5785a6e28e

  • SHA1

    24752be3d70d5a36280da5b7ecf5b5b77039ac8e

  • SHA256

    300c090861a547a4c211b15b9f45d6dcb976128c21b78b6c38d1cf4c5d998e12

  • SHA512

    31915051a03611c7b00b0c25225cb905322e777c9aa3ebc600206c5bc6665cd407d61a66925b4d5c82ec350d503b7f0c99df2c3d62411e226ebcc73c3aceea56

  • SSDEEP

    393216:z7H+xsXvuVGEj5n0ITbPvXSKMMxeeeA5VjfLv:XexYvukEBjSeZeAvv

Malware Config

Extracted

Family

cobaltstrike

Botnet

51451532

C2

http://pandorasong.com:443/access/

Attributes
  • access_type

    512

  • beacon_type

    2048

  • host

    pandorasong.com,/access/

  • http_header1

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAeR2V0Q29udGVudEZlYXR1cmVzLkRMTkEuT1JHOiAxAAAACgAAABVIb3N0OiBwYW5kb3Jhc29uZy5jb20AAAAKAAAASENvb2tpZTogIF9fdXRtYT0zMTAwNjY3MzMuMjg4NDUzNDQ0MC4xNDMzMjAxNDYyLjE0MDMyMDQzNzIuMTM4NTIwMjQ5OC43OwAAAAkAAAAJdmVyc2lvbj00AAAACQAAAA5saWQ9MTU4MjUwMjcyNAAAAAcAAAAAAAAACAAAAAUAAAAFdG9rZW4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_header2

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFUhvc3Q6IHBhbmRvcmFzb25nLmNvbQAAAAcAAAAAAAAABQAAAANyaWQAAAAJAAAADmxpZD0xNjgzNTAzNzM1AAAACQAAAB9tZXRob2Q9Z2V0U2VhcmNoUmVjb21tZW5kYXRpb25zAAAABwAAAAEAAAADAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_method1

    GET

  • http_method2

    POST

  • jitter

    4352

  • maxdns

    255

  • pipe_name

    \\%s\pipe\msagent_%x

  • polling_time

    300000

  • port_number

    443

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCN7UFLcBHjvme4lLXoOKMyNrF46j4Xi87J4ilrNPDQxLOq2KHaCXP+0FsWYs7JFqLXGmqOIfALpPLIyGgnRuC60ZXaSKmCENE2O88Z0BxDkRxSaKEbgv3ETo/Ra7cF8JNr3szy0sNBVyi9dhS2WhXRIU923X2ZQxbpSyUNi5Q//wIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    7.382016e+08

  • unknown2

    AAAABAAAAAIAAAAQAAAAAgAAABAAAAACAAAADAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /radio/xmlrpc/v45

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko

  • watermark

    51451532

Targets

    • Target

      Unconfirmed 757120.crdownload

    • Size

      13.0MB

    • MD5

      e049fd6d80d9285d156cdf5785a6e28e

    • SHA1

      24752be3d70d5a36280da5b7ecf5b5b77039ac8e

    • SHA256

      300c090861a547a4c211b15b9f45d6dcb976128c21b78b6c38d1cf4c5d998e12

    • SHA512

      31915051a03611c7b00b0c25225cb905322e777c9aa3ebc600206c5bc6665cd407d61a66925b4d5c82ec350d503b7f0c99df2c3d62411e226ebcc73c3aceea56

    • SSDEEP

      393216:z7H+xsXvuVGEj5n0ITbPvXSKMMxeeeA5VjfLv:XexYvukEBjSeZeAvv

    Score
    1/10
    • Target

      Coll.CozyBear

    • Size

      12.8MB

    • MD5

      126e79f6a1959f16c79550b4d955d4dd

    • SHA1

      99737418dc14520489f4627c767939b0b38dd9f0

    • SHA256

      fdef234179cd467f728ae51dbb206f1577bc2d73834d105e51a824063f4926c0

    • SHA512

      e0b1c07489ec18c278e04f0e5236fe0f65dcaf99993a11ec0f3c2636acb952a9b89b5e5a9ddbf2a72169d2a40e47d26253a6b31a1071e94bdd5332c941d5e0a7

    • SSDEEP

      393216:95ymIGUXU+gb/WzHzrfoycUNULjPwqIxx1hcVmyqMzh8zvUH2YA:95ymIrq/mwyc4U/4xfgmyF9KLJ

    Score
    1/10
    • Target

      APT29miniduke.bin

    • Size

      140KB

    • MD5

      f08ef840f59cbd4c4695e36ef3eaa9d7

    • SHA1

      68d3673953dc1e3b6273931572f425402c0ecb1c

    • SHA256

      dd215d76bcfd72ebcfb50ccfeb9fb1703af4bbf4821de225009f43fc4e08e432

    • SHA512

      9b00ed01389965266ba957109ec46e01f039103986a479c447ad7ab898349f4fe6453204e3813031e276e2da1953a91e9a27dda88402dcaf90ddc201ee0c7718

    • SSDEEP

      3072:fkumgrfr9NPhDZDEa4qRfOkE7qdjKvoE:MyrfrrhNEufOLi2b

    Score
    3/10
    • Target

      CozyBearImplant.bin

    • Size

      3.0MB

    • MD5

      ce227ae503e166b77bf46b6c8f5ee4da

    • SHA1

      cb872edd1f532c10d0167c99530a65c4d4532a1e

    • SHA256

      b101cd29e18a515753409ae86ce68a4cedbe0d640d385eb24b9bbb69cf8186ae

    • SHA512

      529a7c357ba6588482dff00d6d8c245e4c8b97c23ad1f48e1542406c24c6a72f3e1f02752e2ed3cbb904880f3f7dfbab66d9d50ec24ecc3373aba4c334e397b8

    • SSDEEP

      49152:CCQAYCdp0wNvATRFt03zOavcye0Tiw4qaF8VqGBoGEDyiUmbM7qV3Q7VNb2+f2XU:6CzITRFtyOaE4iqlBcU6MMQPTf2UaESG

    Score
    7/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      out.upx

    • Size

      2.4MB

    • MD5

      e8bc46b4b03cd9d132849cd0047e7f54

    • SHA1

      0ff34ebde7edc5038d80f3d4b84a93a68cd7849b

    • SHA256

      d0e083c0154681050e66820be0f2bd64ce764536afb068200a4455ef8fd9d81d

    • SHA512

      b43ca74add4645eb37d1f68ee1cd2b23df7291107bbfc0744c771283bb8f5a3de5dc4e7e64b9b50c0d32ed3eac1f42622a091e9bd62d158b2553740537f0f3c2

    • SSDEEP

      49152:+kSX6jb5rHEDLBPDu0SVM+RfRYhaTH3IP4H4yn0MdAPYKCW/UL947:7S+x0X4fzYQHR0MdbroK94

    Score
    3/10
    • Target

      ImplantCozy.bin

    • Size

      3.0MB

    • MD5

      004b55a66b3a86a1ce0a0b9b69b95976

    • SHA1

      e2b98c594961aae731b0ccee5f9607080ec57197

    • SHA256

      6c1bce76f4d2358656132b6b1d471571820688ccdbaca0d86d0ca082b9390536

    • SHA512

      30ad634e6491bed01cdb7ca448d03094c568a99f786e1d82702d304df041a76b8c062248840c9d7d5572a44a4d47d2a6024a35ff528ad56302273baf2627d308

    • SSDEEP

      49152:ACQAYCdp0wNvATRFt03zOavcye0mz0c3khqt6L2jOwiQAbM7qV3Q7VNb2+f2XEa5:YCzITRFtyOaEz0q6PS8MMQPTf2UaESjz

    Score
    7/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      out.upx

    • Size

      2.4MB

    • MD5

      3c573f4b2567c1ede2be12acc79b9f9b

    • SHA1

      e518fa185cfadf9893b2993df84d149088fc502a

    • SHA256

      845f4f84ff1e4dc1e06a9d9996c2758551a41ba0eaff37be920d48512b359a46

    • SHA512

      f7eabdc6341570ac60d7150ac980118bd3d57d90a31f17bfe014101ca797855ec163b98a03f177e210c1d3b5bf00e54494d15d0727c1fef218e016f8683baff5

    • SSDEEP

      49152:8kSX6jb5rHEDLBPDu0SVM+RfRYhaTH3IP4H4yn0MdAPYKCW/UL948:tS+x0X4fzYQHR0MdbroK94

    Score
    3/10
    • Target

      MinidukeAPT29.bin

    • Size

      140KB

    • MD5

      887489b27f6e7053ec2702dc8ba51af7

    • SHA1

      79176c5ad3aeca542f9043657bacf55368a63106

    • SHA256

      c485cbcd5b21db8029654bd47879f086feed41492aebed33a9afe9d73f5069e7

    • SHA512

      2a5961a14851ada815319f16af0f44d27c35dfdee041a73e7da985a085964a1fb5cae08e8f40c41436800a137f284d945a3e5bfd04a46c37703daec3820988a1

    • SSDEEP

      3072:fkumgrfr9NPhDZDEa4qRfOkE7qdjKdcE:MyrfrrhNEufOLi2l

    Score
    3/10
    • Target

      Nov2018New!/.DS_Store

    • Size

      6KB

    • MD5

      194577a7e20bdcc7afbb718f502c134c

    • SHA1

      df2fbeb1400acda0909a32c1cf6bf492f1121e07

    • SHA256

      d65165279105ca6773180500688df4bdc69a2c7b771752f0a46ef120b7fd8ec3

    • SHA512

      58941214a8334331e52114aab851fc3d8d5da5dd14983f933da8735c24b0ddcac134e8f13692553199c4d9a14a4b3188b62878a30b9d696edda1204666b60837

    • SSDEEP

      6:VWAlXN6XkEslX/9ldlXSPnrtHP8//kHLEk0/ulXSPnrtHP8//k:QAXN9EEX/HnXw6XMLEk0/qXw6X

    Score
    3/10
    • Target

      Nov2018New!/AudioSes.dll

    • Size

      287KB

    • MD5

      16bbc967a8b6a365871a05c74a4f345b

    • SHA1

      9858d5cb2a6614be3c48e33911bf9f7978b441bf

    • SHA256

      b77ff307ea74a3ab41c92036aea4a049b3c2e69b12a857d26910e535544dfb05

    • SHA512

      68c75c95ee27fd704088dcf381378a2cd32b396a2e405be4e4f8058cf099d88c9f22c9b9a14eaec45880a2b7ae02226f1277020470aadbc153e8dd3168711f99

    • SSDEEP

      6144:S7qE85unM8ajZScS8a+ZhcZBaHTT2Q+dFwQG/:Sz8kM8ClMomdwn/

    • Cobaltstrike

      Detected malicious payload which is part of Cobaltstrike.

    • Blocklisted process makes network request

    • Target

      Nov2018New!/CozybearNov2018Activity.txt

    • Size

      148B

    • MD5

      7e134e9fb8c0da4f3a838774739bece7

    • SHA1

      7f63feac5c0f4e1611d048a4e34e962b9cfa7ac9

    • SHA256

      07a1d57137b3a7bea66f2f599c95aaf7765e24bcbbefcaf6f7885381d92ded89

    • SHA512

      b423cf6eb818845bfd9ae1b3f40efbf217c99821e593e2be13c44618af70a141f4850a12d4bec7b656e3f2b77fcd16c72d2bb970e5e16de4be19c382a6499610

    Score
    3/10
    • Target

      Nov2018New!/ds7001.zip

    • Size

      228KB

    • MD5

      3fccf531ff0ae6fedd7c586774b17a2d

    • SHA1

      cd92f19d3ad4ec50f6d19652af010fe07dca55e1

    • SHA256

      e2945268c976f8dc33ba9a8d1a804f00cff46aabc01cd3196651322a71863b87

    • SHA512

      a67bb72a0ba4b0c27b6a89671bc2cdb871f0c2f420a0a92949ef0d92c9a816e27d48edddced05b793fef2ca4128d2dd69a8fd03300913719802bf39efaec8b84

    • SSDEEP

      3072:n/1lnc4HECJi42LG3ziivBT4sHXH13X//pxR+b+oIIGLGYcLtGpg6lhhTPueR5d9:nnc4HECJp2GzfRFfwI6cpf9Puwv9

    Score
    1/10
    • Target

      ds7002.lnk

    • Size

      392KB

    • MD5

      6ed0020b0851fb71d5b0076f4ee95f3c

    • SHA1

      e431261c63f94a174a1308defccc674dabbe3609

    • SHA256

      2cea2a1f53dac3f4fff156eacc2ecc8e98b1a64f0f5b5ee1c42c69d9a226c55c

    • SHA512

      2a0b04791ab102b6d1760c5f0940969318562f444a5864ebf270f568cc8f6283630ca76377a9fc75691b67e7c459ab10782a2deb439fa9981a2f94bb208232f3

    • SSDEEP

      6144:4DRFp0LpCYvaVrWb8Fo3L+pOEypzzw0xKtF0JMGaGSNVFOWceCa:4DGFwrvFs+UEIZxUOMG9SUNe1

    • Cobaltstrike

      Detected malicious payload which is part of Cobaltstrike.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Target

      Nov2018New!/ds7002.bin

    • Size

      392KB

    • MD5

      6ed0020b0851fb71d5b0076f4ee95f3c

    • SHA1

      e431261c63f94a174a1308defccc674dabbe3609

    • SHA256

      2cea2a1f53dac3f4fff156eacc2ecc8e98b1a64f0f5b5ee1c42c69d9a226c55c

    • SHA512

      2a0b04791ab102b6d1760c5f0940969318562f444a5864ebf270f568cc8f6283630ca76377a9fc75691b67e7c459ab10782a2deb439fa9981a2f94bb208232f3

    • SSDEEP

      6144:4DRFp0LpCYvaVrWb8Fo3L+pOEypzzw0xKtF0JMGaGSNVFOWceCa:4DGFwrvFs+UEIZxUOMG9SUNe1

    • Cobaltstrike

      Detected malicious payload which is part of Cobaltstrike.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Target

      Nov2018New!/ds7002.zip

    • Size

      54KB

    • MD5

      658c6fe38f95995fa8dc8f6cfe41df7b

    • SHA1

      7468c9affa3affb003591b2e2ccee3df0b29ecda

    • SHA256

      1cc77858e5f3513a051a8cf2895891eebe52fdd604017b55030fed0d63cf3faf

    • SHA512

      429c0f5d9245794809a97462b609301cff05584c3d767b91d44e4481f1437df10b6b53d70cde6e2a044637c0b1ffa2cd3c36ccff621cab822f727099d493941f

    • SSDEEP

      1536:6YwmgfgCkL6IsoqOY1NXROuDqwIpsnqXW8XsqXcz3:zvEgCM6Is51S42SIXlcT

    Score
    1/10
    • Target

      ds7002.pdf

    • Size

      85KB

    • MD5

      313f4808aa2a2073005d219bc68971cd

    • SHA1

      053fb60530e884851eb8b6aebbec4570ec788d4a

    • SHA256

      b1c811d3f0e930b0096a9e785f730ba4d92458bd6dcfbdff4cf7a1e247ef20d1

    • SHA512

      1d983f3c659eb3dfac3fe280e7cb3c6e25264752c11ff7d2ab232ffbf30b659a3d61bdf3773ec32caa09de716a3c439dea0d77dab5cb9e07d0e6ec43a0b1a68d

    • SSDEEP

      1536:D9yCD0gevyGyXKSsoqOY1NXRsBYMKtT63VA5nVpjF4t:D9tDdiIPs51AvkbnM

    Score
    1/10
    • Target

      SeaDaddyImplant (2).bin

    • Size

      3.0MB

    • MD5

      004b55a66b3a86a1ce0a0b9b69b95976

    • SHA1

      e2b98c594961aae731b0ccee5f9607080ec57197

    • SHA256

      6c1bce76f4d2358656132b6b1d471571820688ccdbaca0d86d0ca082b9390536

    • SHA512

      30ad634e6491bed01cdb7ca448d03094c568a99f786e1d82702d304df041a76b8c062248840c9d7d5572a44a4d47d2a6024a35ff528ad56302273baf2627d308

    • SSDEEP

      49152:ACQAYCdp0wNvATRFt03zOavcye0mz0c3khqt6L2jOwiQAbM7qV3Q7VNb2+f2XEa5:YCzITRFtyOaEz0q6PS8MMQPTf2UaESjz

    Score
    7/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      out.upx

    • Size

      2.4MB

    • MD5

      3c573f4b2567c1ede2be12acc79b9f9b

    • SHA1

      e518fa185cfadf9893b2993df84d149088fc502a

    • SHA256

      845f4f84ff1e4dc1e06a9d9996c2758551a41ba0eaff37be920d48512b359a46

    • SHA512

      f7eabdc6341570ac60d7150ac980118bd3d57d90a31f17bfe014101ca797855ec163b98a03f177e210c1d3b5bf00e54494d15d0727c1fef218e016f8683baff5

    • SSDEEP

      49152:8kSX6jb5rHEDLBPDu0SVM+RfRYhaTH3IP4H4yn0MdAPYKCW/UL948:tS+x0X4fzYQHR0MdbroK94

    Score
    3/10
    • Target

      SeaDaddyImplant.bin

    • Size

      3.0MB

    • MD5

      ce227ae503e166b77bf46b6c8f5ee4da

    • SHA1

      cb872edd1f532c10d0167c99530a65c4d4532a1e

    • SHA256

      b101cd29e18a515753409ae86ce68a4cedbe0d640d385eb24b9bbb69cf8186ae

    • SHA512

      529a7c357ba6588482dff00d6d8c245e4c8b97c23ad1f48e1542406c24c6a72f3e1f02752e2ed3cbb904880f3f7dfbab66d9d50ec24ecc3373aba4c334e397b8

    • SSDEEP

      49152:CCQAYCdp0wNvATRFt03zOavcye0Tiw4qaF8VqGBoGEDyiUmbM7qV3Q7VNb2+f2XU:6CzITRFtyOaE4iqlBcU6MMQPTf2UaESG

    Score
    7/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      out.upx

    • Size

      2.4MB

    • MD5

      e8bc46b4b03cd9d132849cd0047e7f54

    • SHA1

      0ff34ebde7edc5038d80f3d4b84a93a68cd7849b

    • SHA256

      d0e083c0154681050e66820be0f2bd64ce764536afb068200a4455ef8fd9d81d

    • SHA512

      b43ca74add4645eb37d1f68ee1cd2b23df7291107bbfc0744c771283bb8f5a3de5dc4e7e64b9b50c0d32ed3eac1f42622a091e9bd62d158b2553740537f0f3c2

    • SSDEEP

      49152:+kSX6jb5rHEDLBPDu0SVM+RfRYhaTH3IP4H4yn0MdAPYKCW/UL947:7S+x0X4fzYQHR0MdbroK94

    Score
    3/10
    • Target

      TrojanCozyBear.bin

    • Size

      330KB

    • MD5

      3d3363598f87c78826c859077606e514

    • SHA1

      8b357ff017df3ed882b278d0dbbdf129235d123d

    • SHA256

      01468b1d3e089985a4ed255b6594d24863cfd94a647329c631e4f4e52759f8a9

    • SHA512

      11a9b8dc666877695a7ea0683c83d057b7539fae7e445250d71fd34fdc557df946b4938bf419ddbdc5f4439f3d828ddb4d83d3a9f7f18cb92454da6fdfd99b24

    • SSDEEP

      6144:ul5gIO0ZQWhRE0pPuZR4JKeZHBC9FP0/wLi6xVraC/KSNv:ul5gIO0ZQWE08z40e/CDs/+dxQC/l

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Loads dropped DLL

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Target

      atiagentCozyBear.bin

    • Size

      52KB

    • MD5

      452ee2968ec82c7e30c21c828b330c17

    • SHA1

      00384c359e2931fb922b034fca2707e1b2a25396

    • SHA256

      43cd9ef6904c35c6854bf59d99731a05048af9e870261064a255db0181930fad

    • SHA512

      bef788d69d8d75579cbf6499b4c2aec7c413cc56fea2a51efc4dc7742f52648fff3b64b78b3d8544d81ee473472521d352f931b56564a88031c5116444b65926

    • SSDEEP

      768:5mXbwhMxIYGvy6uqgFuO4IGL1VjOfTaEG9hH36PDMOKqBR4kkJmnjEDXbTvG:uOWIYG66xO4TLHOGjHqhf4kJ9

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks