General
-
Target
c907759dc55a0d49d23c4cd75518f387ceba9663a78253c3c0ec2960e39e6bd0
-
Size
259KB
-
Sample
240805-whck9sxcrg
-
MD5
6776a700854fc87ed78fd61d8d9fca78
-
SHA1
8f56ffbb209b626aed709b4b642bcc72fcaa1451
-
SHA256
c907759dc55a0d49d23c4cd75518f387ceba9663a78253c3c0ec2960e39e6bd0
-
SHA512
84eba8ef04836185686d1a8e5be682783287361e1293d0128c26c298106efc10792b7eec154bb64de81c76400c159fc18b23e144bac2aece8296ea595f8f6a22
-
SSDEEP
6144:uJqVG5d1IpMyibgkTZI6jHID90a1rBXYH/:u3d6tevoxdBXe
Behavioral task
behavioral1
Sample
c907759dc55a0d49d23c4cd75518f387ceba9663a78253c3c0ec2960e39e6bd0.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c907759dc55a0d49d23c4cd75518f387ceba9663a78253c3c0ec2960e39e6bd0.dll
Resource
win10v2004-20240802-en
Malware Config
Extracted
cobaltstrike
100000
http://192.168.1.25:80/dot.gif
-
access_type
512
-
host
192.168.1.25,/dot.gif
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
polling_time
60000
-
port_number
80
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCIU3VoKnfPzdM+irRUAML7zeOEr5TyDZjkuSmeOqpoKDn+AHpha5zem01uUrJ4dBPxO2VA0V4YJRw+e0o1aAYRUjfLTr97zcqU1bf0W5kz2jhviz0du//8trAMwKnv/rC3PiTXaIJE34hiwiU6YlQusqNarjKXDg0hC/56EBXvfwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 1.1.4322)
-
watermark
100000
Targets
-
-
Target
c907759dc55a0d49d23c4cd75518f387ceba9663a78253c3c0ec2960e39e6bd0
-
Size
259KB
-
MD5
6776a700854fc87ed78fd61d8d9fca78
-
SHA1
8f56ffbb209b626aed709b4b642bcc72fcaa1451
-
SHA256
c907759dc55a0d49d23c4cd75518f387ceba9663a78253c3c0ec2960e39e6bd0
-
SHA512
84eba8ef04836185686d1a8e5be682783287361e1293d0128c26c298106efc10792b7eec154bb64de81c76400c159fc18b23e144bac2aece8296ea595f8f6a22
-
SSDEEP
6144:uJqVG5d1IpMyibgkTZI6jHID90a1rBXYH/:u3d6tevoxdBXe
Score1/10 -