General
-
Target
f8d67a21e4ca276367cb9b311e7d717bf7ea487970c9c5a12d56a0fe3846081d.zip
-
Size
130KB
-
Sample
240725-p4frgszbnq
-
MD5
9ee64e70e8133877b7a0ab7b662d932a
-
SHA1
c8c80e9c899cfda355e6368980f636f99d9f715b
-
SHA256
24c4459965fbbe4fd644e24c2a58a1a97613a7eac25c40e778249700fc48307e
-
SHA512
1bcdd96166f961f56ddb50d23059ed1bb3afb90a68e0ffb6407fb178375216765707a5fda0b4c6c747db93d289aea3e7ac12006d5fb79bbd150b2e8e476f45ad
-
SSDEEP
3072:QADOFIEDGJKtUkjc5NBANCvBXZlHAsW9ETFR8FUkwcdM0d/:cFItJKtfcPggBppR5R7kwZ0Z
Behavioral task
behavioral1
Sample
f8d67a21e4ca276367cb9b311e7d717bf7ea487970c9c5a12d56a0fe3846081d.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f8d67a21e4ca276367cb9b311e7d717bf7ea487970c9c5a12d56a0fe3846081d.dll
Resource
win10v2004-20240709-en
Malware Config
Extracted
cobaltstrike
391144938
http://8.147.234.137:5656/ptj
-
access_type
512
-
host
8.147.234.137,/ptj
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
polling_time
60000
-
port_number
5656
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC4C/zCqT5l763V1VsnAqc3Y8bEEDYbQs+MQYBMwxZtxvcT5v6t4p+DmPUlS9DU56kBseFYx+zmrwP0vp3ZOrbm3b/N+RAiVn6ksFz+Ht/kquQ6WqdlglYwQHSBxCBq9NPJvMZu8YHUwkMIKHkLfRN4PeX4HRDYe4jeC6Rr7VbY+wIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; MDDRJS)
-
watermark
391144938
Extracted
cobaltstrike
0
-
watermark
0
Targets
-
-
Target
f8d67a21e4ca276367cb9b311e7d717bf7ea487970c9c5a12d56a0fe3846081d
-
Size
272KB
-
MD5
5bb52025289ba5357199bbe87732ad10
-
SHA1
f10ce6223b8ef1f25370d05ce98b19308d11aae7
-
SHA256
f8d67a21e4ca276367cb9b311e7d717bf7ea487970c9c5a12d56a0fe3846081d
-
SHA512
3734a70665dba699c74f41f4f951aae9dc665dcae58e2e58f50025d13fd07445f4ae782f135a2c200481e2f8d73461490697a29bd58aaef83b09d07d56d880f1
-
SSDEEP
3072:rzbINhWl+CIbfqqEVxtfg8jtfDCJS4l9JTFyG+JteEzCnL7zHGIkfhUYJF6vzHkV:rzbUWootfDCvT4ZTXzCLuIk5UDerKM
Score10/10 -