Behavioral task
behavioral1
Sample
2024-03-18_7fc05302efcb061660cdb57dbb6db6ee_cobalt-strike_karagany_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-18_7fc05302efcb061660cdb57dbb6db6ee_cobalt-strike_karagany_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-03-18_7fc05302efcb061660cdb57dbb6db6ee_cobalt-strike_karagany_mafia
-
Size
61KB
-
MD5
7fc05302efcb061660cdb57dbb6db6ee
-
SHA1
b989abc402091d8cfe0a6de4a49e1c386a7d41f0
-
SHA256
1ee19b2c22b2286640b80e06c436279c595d7ff175219c567f779ad8484f49da
-
SHA512
37bb3874c1a073df7d5b83c51ceec3019f16806c6de8f4f3ad15f00061213db7d2337329367de6bcd9b5d180e9faa0a19f2227a8fc9b9d0f268948c72dacbb7d
-
SSDEEP
1536:oGeFPVQOQwoZBKUHzCJvTinnUwCynYb1VEkbdV:iQXKUOZECIYzEk7
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.100.6:4417
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-18_7fc05302efcb061660cdb57dbb6db6ee_cobalt-strike_karagany_mafia
Files
-
2024-03-18_7fc05302efcb061660cdb57dbb6db6ee_cobalt-strike_karagany_mafia.exe windows:4 windows x86 arch:x86
d1dbf6d4f912bc84142c905a7af77a32
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
QueryPerformanceFrequency
HeapReAlloc
HeapAlloc
IsProcessorFeaturePresent
RtlUnwind
LoadLibraryW
Sleep
HeapFree
EnterCriticalSection
LeaveCriticalSection
GetStringTypeW
MultiByteToWideChar
LCMapStringW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetCommandLineA
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
GetLastError
GetProcAddress
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
HeapCreate
HeapSize
LoadLibraryA
user32
EndPaint
PostQuitMessage
LoadIconA
SetFocus
SendMessageA
BeginPaint
TranslateMessage
GetAsyncKeyState
MessageBoxA
InvalidateRect
CreateWindowExA
PeekMessageA
DefWindowProcA
ShowWindow
DispatchMessageA
UpdateWindow
LoadCursorA
GetDlgCtrlID
GetDlgItemTextA
SetDlgItemTextA
mouse_event
RegisterClassA
gdi32
GetStockObject
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE