General
-
Target
f5e01d8bafc675deb9409c096583a515e59550364790bd69fa18640037c7ad48
-
Size
205KB
-
Sample
240529-fyfd4abf2v
-
MD5
490e863500ed3e11ecd9f602c12cff6e
-
SHA1
7fdae375d9e6992a42300c3fc6f04e80520b9a25
-
SHA256
f5e01d8bafc675deb9409c096583a515e59550364790bd69fa18640037c7ad48
-
SHA512
33d3fc1cb53e85a5af67d27d877f791c5e75f7c0115ed535f2b838b945f6c3e6addf097ab1175af7f5ed2e41cb04bc08226f189557100784c56c0793a46693cd
-
SSDEEP
3072:v/QPFX1eqEfuBNSYuiM8CNj8hFsoMX0ghsJRgCD3iFw9jdU9o5ZY:v/MEfuN0t8C5oFsoeRM3o0jW
Behavioral task
behavioral1
Sample
f5e01d8bafc675deb9409c096583a515e59550364790bd69fa18640037c7ad48.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
f5e01d8bafc675deb9409c096583a515e59550364790bd69fa18640037c7ad48.dll
Resource
win10v2004-20240426-en
Malware Config
Extracted
cobaltstrike
426352781
http://205.204.87.60:443/activity
-
access_type
512
-
beacon_type
2048
-
host
205.204.87.60,/activity
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
polling_time
60000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDCk2QGFxpiH/PnpdOfrRHENyFAmxxdanF6z4S3YdPhyMfu6f07fZhdf9mGGtZy7juEPhMuudQ7+CyvteGJTsY/ln4NG8d8XfRwAAXCbGBO+LfzL9q6CyaoMDbaMaSHVPYUjiBTBdGC3a+C4L8/Du7xYhCnQe7EPrdMU3daXQzIWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; Win64; x64; Trident/6.0; MATMJS)
-
watermark
426352781
Targets
-
-
Target
f5e01d8bafc675deb9409c096583a515e59550364790bd69fa18640037c7ad48
-
Size
205KB
-
MD5
490e863500ed3e11ecd9f602c12cff6e
-
SHA1
7fdae375d9e6992a42300c3fc6f04e80520b9a25
-
SHA256
f5e01d8bafc675deb9409c096583a515e59550364790bd69fa18640037c7ad48
-
SHA512
33d3fc1cb53e85a5af67d27d877f791c5e75f7c0115ed535f2b838b945f6c3e6addf097ab1175af7f5ed2e41cb04bc08226f189557100784c56c0793a46693cd
-
SSDEEP
3072:v/QPFX1eqEfuBNSYuiM8CNj8hFsoMX0ghsJRgCD3iFw9jdU9o5ZY:v/MEfuN0t8C5oFsoeRM3o0jW
Score3/10 -