General

  • Target

    2024-04-10_9620a6cba8c5b1a326a258a43c1e11c0_cobalt-strike_cobaltstrike_meterpreter

  • Size

    291KB

  • Sample

    240410-1h6xbscb63

  • MD5

    9620a6cba8c5b1a326a258a43c1e11c0

  • SHA1

    1f9c868df0b8270357d2e86e51b6d4617d7d98c3

  • SHA256

    0c096bdd5a41620c610983630a8ee9ee2e5cc0c74bdaef4d77c14df8d6c3d4b1

  • SHA512

    416fe2d2a91c0e6852e5a64322e85ad3524edd50818bc7dd2bfd33be0fd9776d6589cab09bf04f265ade37b6cb045417769c2105b46ae131c2ef6927f47ded38

  • SSDEEP

    3072:q+vihzbINhWl+CIbfqqEVxtfg8jtfDCJS4l9JTFyG+JteEzCnL7zzGIkfhUYJF6k:3GzbUWootfDCvT4ZTXzCLKIk5UDsrKM

Malware Config

Extracted

Family

cobaltstrike

Botnet

391144938

C2

http://192.168.239.128:80/dpixel

Attributes
  • access_type

    512

  • host

    192.168.239.128,/dpixel

  • http_header1

    AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_header2

    AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_method1

    GET

  • http_method2

    POST

  • polling_time

    60000

  • port_number

    80

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDtJCh3On7UDRD4HiK4ZRixMjyBbAuhG6/PNrk5b2WpxUMA01BFJpHOyRK6K6N/uFe0Inzdbit9ZmoI0mb4U3CyxJPrrFd2APQy6bQSk/okIh4g7h2Xci6EPDOShsoN00mzw0CAbC5KRzQ5QmkOUcwrFYp8FAk9iENUX2ya0a3LZwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /submit.php

  • user_agent

    Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; FunWebProducts)

  • watermark

    391144938

Targets

    • Target

      2024-04-10_9620a6cba8c5b1a326a258a43c1e11c0_cobalt-strike_cobaltstrike_meterpreter

    • Size

      291KB

    • MD5

      9620a6cba8c5b1a326a258a43c1e11c0

    • SHA1

      1f9c868df0b8270357d2e86e51b6d4617d7d98c3

    • SHA256

      0c096bdd5a41620c610983630a8ee9ee2e5cc0c74bdaef4d77c14df8d6c3d4b1

    • SHA512

      416fe2d2a91c0e6852e5a64322e85ad3524edd50818bc7dd2bfd33be0fd9776d6589cab09bf04f265ade37b6cb045417769c2105b46ae131c2ef6927f47ded38

    • SSDEEP

      3072:q+vihzbINhWl+CIbfqqEVxtfg8jtfDCJS4l9JTFyG+JteEzCnL7zzGIkfhUYJF6k:3GzbUWootfDCvT4ZTXzCLKIk5UDsrKM

    • Cobaltstrike

      Detected malicious payload which is part of Cobaltstrike.

    • Detects Reflective DLL injection artifacts

MITRE ATT&CK Matrix

Tasks