General

  • Target

    f3afbc1bf88e5c2cb02063f7a3fb3c93

  • Size

    289KB

  • Sample

    240311-kgj36sfg3v

  • MD5

    f3afbc1bf88e5c2cb02063f7a3fb3c93

  • SHA1

    bfd550a328b342d74f51dddfb9f361cac41a8bab

  • SHA256

    e80b3ae7e309df8549db0013be54a64a3ff3c6675deb8113973f8978609c96af

  • SHA512

    6357e701280482cd91a005ec736c5241c9366f0909416063097c178a5d11ada2a72ef5850665594edc46aecde13a2964547f6ffbd16d44e9bafd555159dc1397

  • SSDEEP

    6144:0HNrMn3+jjzqsOQihHZKypzUayqLtqTo54u1dZe4RbYJlIz7Hk8I5J3e:0HNrM3EeHQGBBoqLt31doKYPIEj5c

Malware Config

Extracted

Family

cobaltstrike

Botnet

391144938

C2

http://8.134.126.121:6666/updates.rss

Attributes
  • access_type

    512

  • host

    8.134.126.121,/updates.rss

  • http_header1

    AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_header2

    AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_method1

    GET

  • http_method2

    POST

  • polling_time

    60000

  • port_number

    6666

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCuoNLw9EjDdZYhq4E0JzAELRqKwQWA4FUX9Ck8aeawXeJoACrTq9rsx+ZvmPZSI4T2uaY0wVixAf6/71dF2AdI1LNx9/TN/e/phalDheh0ffyx3uYoJYXmWMteHtoVfNGfMRtvC8/eLl6q2xxbSG3SRhWS0R6kw3jn+8vO9t9oowIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /submit.php

  • user_agent

    Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; MALC)

  • watermark

    391144938

Targets

    • Target

      f3afbc1bf88e5c2cb02063f7a3fb3c93

    • Size

      289KB

    • MD5

      f3afbc1bf88e5c2cb02063f7a3fb3c93

    • SHA1

      bfd550a328b342d74f51dddfb9f361cac41a8bab

    • SHA256

      e80b3ae7e309df8549db0013be54a64a3ff3c6675deb8113973f8978609c96af

    • SHA512

      6357e701280482cd91a005ec736c5241c9366f0909416063097c178a5d11ada2a72ef5850665594edc46aecde13a2964547f6ffbd16d44e9bafd555159dc1397

    • SSDEEP

      6144:0HNrMn3+jjzqsOQihHZKypzUayqLtqTo54u1dZe4RbYJlIz7Hk8I5J3e:0HNrM3EeHQGBBoqLt31doKYPIEj5c

MITRE ATT&CK Matrix

Tasks