General

  • Target

    cb4f8113d74b28f492d4cff996d6e4b16af15119286a38f10fce315b71e98191.zip

  • Size

    111KB

  • MD5

    197744b5f3573165f6b05abc4842a846

  • SHA1

    11ff5a52d4713e594fcb9a022da5d9f11b31465c

  • SHA256

    0c11fe19438c9d334b4445efb85c89e270649b24ddbce3a0396b47c9837402c5

  • SHA512

    2b196bccd5a1a80c42b24697664b759d186d027f28d45d9a43f416463b94b9cb2b00b30cee29a0d11fc138889aff1ae244bd1828fbac54bdb416633ffce8b981

  • SSDEEP

    3072:8RRYZvnoL0NqjbxjQh6Yu/NLfT2r7cKP2WVkX00deE/:8Rk3Y1jVYGfT2rYK2WS

Score
10/10

Malware Config

Extracted

Family

cobaltstrike

Botnet

305419896

C2

http://vpn1.windowsshop.cc:53/cm

Attributes
  • access_type

    512

  • beacon_type

    256

  • host

    vpn1.windowsshop.cc,/cm

  • http_header1

    AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_header2

    AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_method1

    GET

  • http_method2

    POST

  • maxdns

    255

  • polling_time

    60000

  • port_number

    53

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCKpiivbobEAUaZWbZqVGKaAshoP4Ccoif56nPFPvMYyJGavvhaMMdM9Mwavy/YJ81qbDOcpu918CtuM/uxQyGVwuDxNga7sG+ZPqSFjyLr1YtsiYu5jnmsC3BfWcIeCTV2ONqm5dDKvtq7soK0GVs0KcMZN9TbU24QiBbDZNAI4wIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /submit.php

  • user_agent

    Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; MALC)

  • watermark

    305419896

Signatures

  • Cobalt Strike reflective loader 1 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • cb4f8113d74b28f492d4cff996d6e4b16af15119286a38f10fce315b71e98191.zip
    .zip

    Password: infected

  • cb4f8113d74b28f492d4cff996d6e4b16af15119286a38f10fce315b71e98191
    .dll windows:5 windows x86 arch:x86

    Password: infected

    55e56f5b29c4d5cd1ed8cc482e47ff78


    Headers

    Imports

    Exports

    Sections