General
-
Target
c83edbc9c8db375ddd28677d4371781a
-
Size
206KB
-
MD5
c83edbc9c8db375ddd28677d4371781a
-
SHA1
edf84024e507c2c393725c3e382232d3e83a4eea
-
SHA256
b46198a099ff4753353da9b8b50885d9e8cb29456cbcf03db0f32edeb4305f35
-
SHA512
81692129d3666ae7b92bc6d9ffcf4e6c17cfee9c57f2236ac4c28c5fcf5a7e9de97f52d603777d4aecc49e2fbe748bb0235b9950f644461ccabcccd2448520ff
-
SSDEEP
6144:9qviJvlW67kFE5nK5nZ82masNrnKGArMnsLFWuUGS:auvc67kWJAnyaGrnKhrZWwS
Malware Config
Extracted
cobaltstrike
1152403637
http://microsoftonlinev2.com:443/owa/KibFDqkXxV3h5DoHzwmMiXsCfK
-
access_type
512
-
beacon_type
2048
-
host
microsoftonlinev2.com,/owa/KibFDqkXxV3h5DoHzwmMiXsCfK
-
http_header1
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
-
http_header2
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
-
http_method1
GET
-
http_method2
GET
-
jitter
7680
-
polling_time
35000
-
port_number
443
-
sc_process32
%windir%\syswow64\logman.exe
-
sc_process64
%windir%\sysnative\logman.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCKNM0ag8h1VBfSjeEZ9stkela9suQCkaIv/K7Nq3G9ZUM2mGCZRrlFE3zZ2UvSDYwDpcw6GuaUJFLpf1S+kqap9LU1pOyzP/xQpi9NWWuhx3jmxzLYEuAWonF3x02LBaCW0N/R9SNMXJH6jI5+2lv9emg8EAdiZz3MvDofV84i4wIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
8192
-
unknown2
AAAABAAAAAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown3
1.610612736e+09
-
uri
/owa/Z-JMO7BW21iZ9kMDVFcU-6
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.106 Safari/537.36
-
watermark
1152403637
Signatures
-
Cobaltstrike family
Files
-
c83edbc9c8db375ddd28677d4371781a