General
-
Target
e73a36f7ce96bf12bcfc13247a19ccdb9d33d89dd2a3bea3c90da176e3370555.zip
-
Size
164KB
-
Sample
240724-1g27raycpk
-
MD5
7e47c46ce97f38b172b831e88db32dd0
-
SHA1
a3e3d71e3ff27279d074cf0808d045b856033974
-
SHA256
9b2a445ce05fb24205be4ed5ba2ec408f1748bf64c103ad2efbf69e8d3d4a897
-
SHA512
0e3bb8bfa993a7bf3c4c23998ecbf6599c05ce55801b2b3771f6d8bc8c830a60a00825f1f50ca06924fffecb01764e76d6a21f8944cdcbe699f02d8ce580bf76
-
SSDEEP
3072:4aVbGVSiCx8Y4SJShzilsvQ3lvwgyybmS6CFuBqGARwd+W14/OTHEoP67s:vNGjCx0fMlvwabmSr+dZTHEoyg
Behavioral task
behavioral1
Sample
e73a36f7ce96bf12bcfc13247a19ccdb9d33d89dd2a3bea3c90da176e3370555.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
e73a36f7ce96bf12bcfc13247a19ccdb9d33d89dd2a3bea3c90da176e3370555.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
cobaltstrike
20410727
http://222.190.151.52:50123/updates.rss
-
access_type
512
-
host
222.190.151.52,/updates.rss
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
polling_time
60000
-
port_number
50123
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC4DfHOjUHg14w9kl1/spHutqurOo7telF7y1JjH2RaWNTH8XcUrkq+RMl4bCvDvGhPKMBAiyXcpF28ofMEhOxKfWMQD3TwBDRbf9aPcuY3gaVLj9fx7Qjurc/7mRm9j7SCoVaKB5322XX6D/hH9TEzWizPTQJJw9X8sfa/P7XV7wIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
-
watermark
20410727
Targets
-
-
Target
e73a36f7ce96bf12bcfc13247a19ccdb9d33d89dd2a3bea3c90da176e3370555
-
Size
596KB
-
MD5
9638ec820ea456305d6be61c2b0372c1
-
SHA1
b86a2f2e7e8ed32c625467df9b52b8fba1f562fe
-
SHA256
e73a36f7ce96bf12bcfc13247a19ccdb9d33d89dd2a3bea3c90da176e3370555
-
SHA512
e7dab7aa384da87da6b33598c2cde35f79a0fb50ef96ccb726545f17177bb6cc17733cee676456e70e30e54c4915deb04c94e46104b515d0bbb27c240ed375c2
-
SSDEEP
6144:MsYwjwIGIprfJQeGTIDjhOTRMQ8EoB/4iqB:ME/jQehLQ8Rp4Z
Score1/10 -