General

  • Target

    8fc06223f327c7fd6d597e9a9b5c0c05833923e28875026df0f470f13d08c49d.zip

  • Size

    125KB

  • MD5

    2c97b2389c42c049ca581c8555a3ac8f

  • SHA1

    1da419b4a1699e8b5b29c64aec9044b12a3778bd

  • SHA256

    427966d22f265d945509d9a1d1b1ab79bb6512d5233f8cd0ce271a6cd9a83cf0

  • SHA512

    b2f0bbfb1ee722df8547e4343a624bfa67dbc786b02ad961f800eb2597dab67f56674a14d34d54573bf3af8ed3b6e27c0f9430d1e24975bdffe7aa2f735c6fba

  • SSDEEP

    3072:urNanckeMy5neWVjQwyHUECd8UEnUl09MY5EdWCQRbdO:GNlkMdrjPyHFCd8UskQRGICH

Score
10/10

Malware Config

Extracted

Family

cobaltstrike

Botnet

100000

Attributes
  • beacon_type

    1024

  • host

    10.10.10.128

  • http_header1

    AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_header2

    AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • polling_time

    10000

  • port_number

    6868

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC7kVQcHvtl4jx3rm3gj1UPIAG8/LsJbz+x6qZIVWzRT32ptINbE8zTWLZzcrrfaWwYCaiMxB8d10t09jRI2XI31dDeT5CYSMhmJBgeCMoQDtnTpot2pcrO3WMs9+H1Jg2EdfKBPr63aYme0iGSwpa7O9n8fLYdIN0Ziv3dz7mZ8wIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • watermark

    100000

Signatures

  • Cobaltstrike family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 8fc06223f327c7fd6d597e9a9b5c0c05833923e28875026df0f470f13d08c49d.zip
    .zip

    Password: infected

  • 8fc06223f327c7fd6d597e9a9b5c0c05833923e28875026df0f470f13d08c49d
    .dll windows:5 windows x64 arch:x64

    Password: infected

    68ecdba3295868c3633731b8147138b7


    Headers

    Imports

    Exports

    Sections