General

  • Target

    55fb6a04a3be2d95d112cb3f019c95a0_NeikiAnalytics.exe

  • Size

    1.2MB

  • Sample

    240519-23av3afh92

  • MD5

    55fb6a04a3be2d95d112cb3f019c95a0

  • SHA1

    3c5b7d591b200f762a7602796c93676b54227824

  • SHA256

    3e11f272e8fa124e25f066e8fee0cc61ded2ed33de0dcabd0b1f877891c1bb9a

  • SHA512

    bb619ec432e375e5ffcae857b165d2a4788a323ef1360d1ffa54824d215aea05f19bb1645fc946f260e6dbbca2ecb8415f7a572e38bd822fdcee4bfe3b6d88e0

  • SSDEEP

    12288:KPyTq0AbnFOiqMP8axEkDvnD2GMSzfuq3e7TZnVHgMZtKd7Z5y9gVXomDmE9cdJ:dT/AbnFOk8axEUvnQTFVHgJ7Z5agV

Malware Config

Extracted

Family

cobaltstrike

Botnet

305419896

C2

http://chinamobi1e.shop:2086/ga.js

Attributes
  • access_type

    512

  • host

    chinamobi1e.shop,/ga.js

  • http_header1

    AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_header2

    AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_method1

    GET

  • http_method2

    POST

  • maxdns

    255

  • polling_time

    60000

  • port_number

    2086

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCnCZHWnYFqYB/6gJdkc4MPDTtBJ20nkEAd3tsY4tPKs8MV4yIjJb5CtlrbKHjzP1oD/1AQsj6EKlEMFIKtakLx5+VybrMYE+dDdkDteHmVX0AeFyw001FyQVlt1B+OSNPRscKI5sh1L/ZdwnrMy6S6nNbQ5N5hls6k2kgNO5nQ7QIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /submit.php

  • user_agent

    Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1)

  • watermark

    305419896

Extracted

Family

cobaltstrike

Botnet

0

Attributes
  • watermark

    0

Targets

    • Target

      55fb6a04a3be2d95d112cb3f019c95a0_NeikiAnalytics.exe

    • Size

      1.2MB

    • MD5

      55fb6a04a3be2d95d112cb3f019c95a0

    • SHA1

      3c5b7d591b200f762a7602796c93676b54227824

    • SHA256

      3e11f272e8fa124e25f066e8fee0cc61ded2ed33de0dcabd0b1f877891c1bb9a

    • SHA512

      bb619ec432e375e5ffcae857b165d2a4788a323ef1360d1ffa54824d215aea05f19bb1645fc946f260e6dbbca2ecb8415f7a572e38bd822fdcee4bfe3b6d88e0

    • SSDEEP

      12288:KPyTq0AbnFOiqMP8axEkDvnD2GMSzfuq3e7TZnVHgMZtKd7Z5y9gVXomDmE9cdJ:dT/AbnFOk8axEUvnQTFVHgJ7Z5agV

    • Cobaltstrike

      Detected malicious payload which is part of Cobaltstrike.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

MITRE ATT&CK Matrix

Tasks