General

  • Target

    a86d082be331234f5524788c56e4983d8c57c5a81df6969fd4c9b3ec21e6f52b

  • Size

    112KB

  • MD5

    514864e91aad0cdedafc7cd5f49e69a7

  • SHA1

    fa14449b0ec5a8a01a817c8446d587909a4d16e1

  • SHA256

    a86d082be331234f5524788c56e4983d8c57c5a81df6969fd4c9b3ec21e6f52b

  • SHA512

    c9c7195ff236b319e7a6bed6c585e2c0f8b581d3fdad8d43ac9b582cbee6fdba6281ab8e5b50290eeb41cd92f00608ebca056938a4fc18133c37691cd2c4d4ba

  • SSDEEP

    3072:zs2YjaYTOhy9qeLrAiH/+8V0qcQi/QPUgtJ5WuUeQ:zAakL91/AiH/+0t1iDoJ5meQ

Score
10/10

Malware Config

Extracted

Family

cobaltstrike

Botnet

305419896

C2

http://8.130.115.187:2223/cm

Attributes
  • access_type

    512

  • host

    8.130.115.187,/cm

  • http_header1

    AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_header2

    AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_method1

    GET

  • http_method2

    POST

  • maxdns

    255

  • polling_time

    60000

  • port_number

    2223

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCGctXj7riK6SVTKIAEnu9/cHczVmQa9DYXRlStP1jGUfFGOPvZiHaxm/JbymOgNKgfsZWSlLBfd7Als3O8UhmipNNiQJsw8ptErg01BAUYEEiDnN6pZNy8zOkEvX1dsrDNnzTJytX9BUr0iOVuvSoui4loMF7d+nPSkJzDkNDDhQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /submit.php

  • user_agent

    Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; WOW64; Trident/6.0)

  • watermark

    305419896

Signatures

  • Cobalt Strike reflective loader 1 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • a86d082be331234f5524788c56e4983d8c57c5a81df6969fd4c9b3ec21e6f52b
    .zip

    Password: infected

  • 84989660e58e338879cbab21ec061f8d4ec4a0820a2127d525a6819f4b0f2ffb
    .dll windows:5 windows x86 arch:x86

    b450a8226d3ed9f582c2242845b7b787


    Headers

    Imports

    Exports

    Sections