General
-
Target
1308-54-0x000007FEFAB20000-0x000007FEFABCC000-memory.dmp
-
Size
688KB
-
Sample
240305-qyahysga7y
-
MD5
18657469b6189d7d3a9cc2123903e668
-
SHA1
b87e4d962e7de5776b359de35322b65fb70efc0a
-
SHA256
3c2dcff8e94d4c91468f8356ff6fc51be2b04dd06e802f1ba61ab8b913632f49
-
SHA512
e62a869da4e87fd920e3228385ec5cc14a69f060410cadfd67af7cca11a558deaceb7aa962e3accc12fae1bbd69f59764da9aae496c29f1196b2f3d969f65fd4
-
SSDEEP
12288:WkfOMJ8Xo2vujbIS0wSJSkORCXdpVo2GN:zfO36jbIpwSTOWfVPy
Behavioral task
behavioral1
Sample
1308-54-0x000007FEFAB20000-0x000007FEFABCC000-memory.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1308-54-0x000007FEFAB20000-0x000007FEFABCC000-memory.dll
Resource
win10v2004-20240226-en
Malware Config
Extracted
cobaltstrike
674054486
http://reserchmenow.com:80/wc/58462514417
-
access_type
512
-
host
reserchmenow.com,/wc/58462514417
-
http_header1
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
-
http_header2
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
-
http_method1
GET
-
http_method2
POST
-
jitter
6912
-
polling_time
38500
-
port_number
80
-
sc_process32
%windir%\syswow64\gpupdate.exe
-
sc_process64
%windir%\sysnative\gpupdate.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC1ba0n4aPGmn8CrevfidUYb5YhabGg43L9IPXoh+II1yHE1A/qUpLp3bPEI6qYM2FBNLhK5ayr9A6WxJ1uATGgiclQ0zqJYt6fNAs9Rnc0grsAC9ro/b4DQ/Jd7xfxaVk0dwNsSoxljhqdFmO/hUwla0UzHdCzuUhlMUPkzKkhhwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
1.868633344e+09
-
unknown2
AAAABAAAAAEAAACOAAAAAQAAAgEAAAABAAAAAgAAAAIAAAmGAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown3
1.610612736e+09
-
uri
/meeting/save
-
user_agent
Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 7.0; InfoPath.3; .NET CLR 3.1.40767; Trident/6.0; en-IN)
-
watermark
674054486
Targets
-
-
Target
1308-54-0x000007FEFAB20000-0x000007FEFABCC000-memory.dmp
-
Size
688KB
-
MD5
18657469b6189d7d3a9cc2123903e668
-
SHA1
b87e4d962e7de5776b359de35322b65fb70efc0a
-
SHA256
3c2dcff8e94d4c91468f8356ff6fc51be2b04dd06e802f1ba61ab8b913632f49
-
SHA512
e62a869da4e87fd920e3228385ec5cc14a69f060410cadfd67af7cca11a558deaceb7aa962e3accc12fae1bbd69f59764da9aae496c29f1196b2f3d969f65fd4
-
SSDEEP
12288:WkfOMJ8Xo2vujbIS0wSJSkORCXdpVo2GN:zfO36jbIpwSTOWfVPy
Score1/10 -