General

  • Target

    e73a36f7ce96bf12bcfc13247a19ccdb9d33d89dd2a3bea3c90da176e3370555.zip

  • Size

    164KB

  • Sample

    240724-1g27raycpk

  • MD5

    7e47c46ce97f38b172b831e88db32dd0

  • SHA1

    a3e3d71e3ff27279d074cf0808d045b856033974

  • SHA256

    9b2a445ce05fb24205be4ed5ba2ec408f1748bf64c103ad2efbf69e8d3d4a897

  • SHA512

    0e3bb8bfa993a7bf3c4c23998ecbf6599c05ce55801b2b3771f6d8bc8c830a60a00825f1f50ca06924fffecb01764e76d6a21f8944cdcbe699f02d8ce580bf76

  • SSDEEP

    3072:4aVbGVSiCx8Y4SJShzilsvQ3lvwgyybmS6CFuBqGARwd+W14/OTHEoP67s:vNGjCx0fMlvwabmSr+dZTHEoyg

Score
10/10

Malware Config

Extracted

Family

cobaltstrike

Botnet

20410727

C2

http://222.190.151.52:50123/updates.rss

Attributes
  • access_type

    512

  • host

    222.190.151.52,/updates.rss

  • http_header1

    AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_header2

    AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_method1

    GET

  • http_method2

    POST

  • polling_time

    60000

  • port_number

    50123

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC4DfHOjUHg14w9kl1/spHutqurOo7telF7y1JjH2RaWNTH8XcUrkq+RMl4bCvDvGhPKMBAiyXcpF28ofMEhOxKfWMQD3TwBDRbf9aPcuY3gaVLj9fx7Qjurc/7mRm9j7SCoVaKB5322XX6D/hH9TEzWizPTQJJw9X8sfa/P7XV7wIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /submit.php

  • user_agent

    Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)

  • watermark

    20410727

Targets

    • Target

      e73a36f7ce96bf12bcfc13247a19ccdb9d33d89dd2a3bea3c90da176e3370555

    • Size

      596KB

    • MD5

      9638ec820ea456305d6be61c2b0372c1

    • SHA1

      b86a2f2e7e8ed32c625467df9b52b8fba1f562fe

    • SHA256

      e73a36f7ce96bf12bcfc13247a19ccdb9d33d89dd2a3bea3c90da176e3370555

    • SHA512

      e7dab7aa384da87da6b33598c2cde35f79a0fb50ef96ccb726545f17177bb6cc17733cee676456e70e30e54c4915deb04c94e46104b515d0bbb27c240ed375c2

    • SSDEEP

      6144:MsYwjwIGIprfJQeGTIDjhOTRMQ8EoB/4iqB:ME/jQehLQ8Rp4Z

    Score
    1/10

MITRE ATT&CK Matrix

Tasks