General

  • Target

    2de18b4a66e094918e5ff44616bb5c21_JaffaCakes118

  • Size

    204KB

  • MD5

    2de18b4a66e094918e5ff44616bb5c21

  • SHA1

    bf0507a9bcdd3ba0629125c78d846b5adadce2d7

  • SHA256

    94b9301c9a5ecb700f6921332fdd25c6d41ee9efaa76cdb86b3d368b7304ea41

  • SHA512

    050f3cebf1ec8fa3b6749ec6f79b0fa1a476cbece694e4e863147b7f3213863d49d082add64a12c63caa9c04294f078bc9701060e209a7d81b097d307dc1b3b9

  • SSDEEP

    3072:5dFna2JSkcrnYSdM50RAXSPy0qUiS0Lxh5H4evyzUhjQUFR5e:FRYkcrY4MCIt07iPlvU0j

Score
10/10

Malware Config

Extracted

Family

cobaltstrike

Botnet

305419896

C2

http://trackpixidr.global.ssl.fastly.net:443/dpixel

Attributes
  • access_type

    512

  • beacon_type

    2048

  • host

    trackpixidr.global.ssl.fastly.net,/dpixel

  • http_header1

    AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_header2

    AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_method1

    GET

  • http_method2

    POST

  • maxdns

    255

  • polling_time

    60000

  • port_number

    443

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCWOiFkh60rsrryVPjRHyOz9Wo1bmy9S/MhULHhEH9SAdDhpsT7THrF1itlciFrqYcg9Yau8mYaqpnKIybwJt07vUmKtiiAoQgGLZcWM7Lq2tS2a5ziOxnKfoOWqKvqtOnfjqPFZXO7osbzj+UOGhXLaqpf3F3H/ADFxEHYrUMHbwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /submit.php

  • user_agent

    Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; yie9)

  • watermark

    305419896

Signatures

  • Cobalt Strike reflective loader 1 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2de18b4a66e094918e5ff44616bb5c21_JaffaCakes118
    .dll windows:5 windows x86 arch:x86

    b450a8226d3ed9f582c2242845b7b787


    Headers

    Imports

    Exports

    Sections