General
-
Target
13113083176a2835346122ec6bb47de0N.exe
-
Size
609KB
-
Sample
240721-1bejhaxgkr
-
MD5
13113083176a2835346122ec6bb47de0
-
SHA1
12526f1c5e34e17c9f482c5815feb41141ae6e2d
-
SHA256
9dcc104dedc5c2893bb6ed205037103c2642227e39a2c6121d05d40d0f9364dd
-
SHA512
153d0bac6549866619ab6359690bdcae4754702d896e0ae28880e281bd0b8ad858f8fbea9370bc4235ea680dff3cbf889ab9b1838483842d2d302ead631e70c7
-
SSDEEP
12288:fzeRkw+E1eEdBSeOFwD01Lz2qtgvx+UjodEJHxao53baj55Sr:IjbL6y0xzdgvFZL53ej
Static task
static1
Behavioral task
behavioral1
Sample
13113083176a2835346122ec6bb47de0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
13113083176a2835346122ec6bb47de0N.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
cobaltstrike
391144938
http://47.94.109.125:80/en_US/all.js
-
access_type
512
-
host
47.94.109.125,/en_US/all.js
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
polling_time
60000
-
port_number
80
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCHzW0oPoT8z/oaYW2Kt2A57kouWvPdgOvP7ff6m0uhPa8PFpuWCb6UcFMNoHrBcdZkvOzBSQeakF5rYZqtMioe2Q6bSh/M6s3TkeERDxBjZl8lWUdpZwq9+cQQtpLhWQEQbB5UaNqjBPOi57ZUPezkymM4fg5V33YHjnjebqrykQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; Win64; x64; Trident/6.0)
-
watermark
391144938
Targets
-
-
Target
13113083176a2835346122ec6bb47de0N.exe
-
Size
609KB
-
MD5
13113083176a2835346122ec6bb47de0
-
SHA1
12526f1c5e34e17c9f482c5815feb41141ae6e2d
-
SHA256
9dcc104dedc5c2893bb6ed205037103c2642227e39a2c6121d05d40d0f9364dd
-
SHA512
153d0bac6549866619ab6359690bdcae4754702d896e0ae28880e281bd0b8ad858f8fbea9370bc4235ea680dff3cbf889ab9b1838483842d2d302ead631e70c7
-
SSDEEP
12288:fzeRkw+E1eEdBSeOFwD01Lz2qtgvx+UjodEJHxao53baj55Sr:IjbL6y0xzdgvFZL53ej
Score10/10 -