General

  • Target

    beacon.exe

  • Size

    289KB

  • Sample

    240521-lpedbsgg49

  • MD5

    8a76bfde6d6f71f53daa4e41291a972f

  • SHA1

    a33d6cc16450ef81473b9ed35ce314bc8b9dc960

  • SHA256

    e11b00dca098633780f2682d86e3e8d8ab6d9dae5cc8b604609fbedbc55879e3

  • SHA512

    4c96ad3267e4b683755dbeb5a3fd55a86be68860298c00a5ba2b7baa3619c90dbef6e56dfe271240ee334d7021685ea6a22ae1963b283c1505a01b055ddc60aa

  • SSDEEP

    6144:fjZfzXkCDh4ber11E+mTeAn2+k8lCiFy9jVY/L:fjJ4Gh4GeTeP+kWFy9j

Malware Config

Extracted

Family

cobaltstrike

Botnet

987654321

C2

http://175.178.128.143:7071/jquery-3.3.1.min.js

Attributes
  • access_type

    512

  • host

    175.178.128.143,/jquery-3.3.1.min.js

  • http_header1

    AAAACgAAAEdBY2NlcHQ6IHRleHQvaHRtbCxhcHBsaWNhdGlvbi94aHRtbCt4bWwsYXBwbGljYXRpb24veG1sO3E9MC45LCovKjtxPTAuOAAAAAoAAAAgUmVmZXJlcjogaHR0cDovL2NvZGUuanF1ZXJ5LmNvbS8AAAAKAAAAHkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQAAAAcAAAAAAAAADQAAAAIAAAAJX19jZmR1aWQ9AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_header2

    AAAACgAAAEdBY2NlcHQ6IHRleHQvaHRtbCxhcHBsaWNhdGlvbi94aHRtbCt4bWwsYXBwbGljYXRpb24veG1sO3E9MC45LCovKjtxPTAuOAAAAAoAAAAgUmVmZXJlcjogaHR0cDovL2NvZGUuanF1ZXJ5LmNvbS8AAAAKAAAAHkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQAAAAcAAAAAAAAADwAAAA0AAAAFAAAACF9fY2ZkdWlkAAAABwAAAAEAAAAPAAAADQAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_method1

    GET

  • http_method2

    POST

  • jitter

    12800

  • polling_time

    1000

  • port_number

    7071

  • sc_process32

    %windir%\syswow64\WerFault.exe

  • sc_process64

    %windir%\sysnative\WerFault.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDOqPOuLBhY+MoVJxqn1c3+3GDWAgjRYXcGHCT88493z+LAcFVTWoKeWY8KcjqWUzD+cqSJ37m1d0j8tojNgr3hUATqlT718sgSO8tZT3vdMRVr375dzCCXZsrIFUmrd+4BRoANT1vNmXOJL+ClB0ljZX6qt9M8SgFboZeAHCne/QIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4.234810624e+09

  • unknown2

    AAAABAAAAAEAAAXyAAAAAgAAAFQAAAACAAAPWwAAAA0AAAAPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /jquery-3.3.2.min.js

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36 Edg/123.0.0.0

  • watermark

    987654321

Targets

    • Target

      beacon.exe

    • Size

      289KB

    • MD5

      8a76bfde6d6f71f53daa4e41291a972f

    • SHA1

      a33d6cc16450ef81473b9ed35ce314bc8b9dc960

    • SHA256

      e11b00dca098633780f2682d86e3e8d8ab6d9dae5cc8b604609fbedbc55879e3

    • SHA512

      4c96ad3267e4b683755dbeb5a3fd55a86be68860298c00a5ba2b7baa3619c90dbef6e56dfe271240ee334d7021685ea6a22ae1963b283c1505a01b055ddc60aa

    • SSDEEP

      6144:fjZfzXkCDh4ber11E+mTeAn2+k8lCiFy9jVY/L:fjJ4Gh4GeTeP+kWFy9j

MITRE ATT&CK Matrix

Tasks