General

  • Target

    b2f373d2e11f9632ec15a36e23e875e3579009af5acf49c69b79d8ce943defa5

  • Size

    449KB

  • Sample

    240406-gpbvzsch32

  • MD5

    35f9fdd949564511f5bd2fc2b0894087

  • SHA1

    789499e7b03d472b121da8d2c6ace4f6aeeeb96f

  • SHA256

    b2f373d2e11f9632ec15a36e23e875e3579009af5acf49c69b79d8ce943defa5

  • SHA512

    3f7050da89039fd57a0322e540e9505a7008ade120c99115c6b1303c69cc70de068d4a97dbc7cec1cd2f1fb369e89b3113a82338e511bfdb5a3fabcf28aa8fec

  • SSDEEP

    6144:ioifTxAbeg6LH7sUHQS7DPwzZONQXaK4MFHUfMDCRU:ioilAx6LHfQS7D8ZONQXgMFyi

Malware Config

Extracted

Family

cobaltstrike

Botnet

20410727

C2

http://222.190.151.52:50123/updates.rss

Attributes
  • access_type

    512

  • host

    222.190.151.52,/updates.rss

  • http_header1

    AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_header2

    AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_method1

    GET

  • http_method2

    POST

  • polling_time

    60000

  • port_number

    50123

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC4DfHOjUHg14w9kl1/spHutqurOo7telF7y1JjH2RaWNTH8XcUrkq+RMl4bCvDvGhPKMBAiyXcpF28ofMEhOxKfWMQD3TwBDRbf9aPcuY3gaVLj9fx7Qjurc/7mRm9j7SCoVaKB5322XX6D/hH9TEzWizPTQJJw9X8sfa/P7XV7wIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /submit.php

  • user_agent

    Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)

  • watermark

    20410727

Extracted

Family

cobaltstrike

Botnet

0

Attributes
  • watermark

    0

Targets

    • Target

      b2f373d2e11f9632ec15a36e23e875e3579009af5acf49c69b79d8ce943defa5

    • Size

      449KB

    • MD5

      35f9fdd949564511f5bd2fc2b0894087

    • SHA1

      789499e7b03d472b121da8d2c6ace4f6aeeeb96f

    • SHA256

      b2f373d2e11f9632ec15a36e23e875e3579009af5acf49c69b79d8ce943defa5

    • SHA512

      3f7050da89039fd57a0322e540e9505a7008ade120c99115c6b1303c69cc70de068d4a97dbc7cec1cd2f1fb369e89b3113a82338e511bfdb5a3fabcf28aa8fec

    • SSDEEP

      6144:ioifTxAbeg6LH7sUHQS7DPwzZONQXaK4MFHUfMDCRU:ioilAx6LHfQS7D8ZONQXgMFyi

MITRE ATT&CK Matrix

Tasks