General

  • Target

    5b441509a2d319ed45c2c603f344b1e5f5def1c9d797eae039eece52c3839962.zip

  • Size

    108KB

  • MD5

    48ed43d1aaeab0e54004d5c3c08af51e

  • SHA1

    9b7eb172e39cceb9c94ba61e3bf717102e169f30

  • SHA256

    b1d70b7a3269106fac78148e006b2640bf72bec059207bbaaa2357a58711e2fc

  • SHA512

    e54314f09eb1b8667b898b48b44d792b98d7b6c91d0449b1aacdafb9ab03418bd447286c8004553f47e5ba0b489cbb92758c2dd0f437cf120d1baa77a329b7ee

  • SSDEEP

    3072:aVB1hwDxcfIag6o5OCU4gMUD27yBo2oVWcLsloUNVoqBraR:aVB1CVcftvzCU4Z8xd81J

Score
10/10

Malware Config

Extracted

Family

cobaltstrike

Botnet

0

Attributes
  • beacon_type

    512

  • http_header1

    AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_header2

    AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • pipe_name

    \\.\pipe\msagent_3143

  • polling_time

    10000

  • port_number

    4444

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCAJgrD58wcHhpNqxew7EHFE8jXWLVYrbkaEf2SVwAWAUG44Rbt1akIIWO6lfkc+kTDoQ05Mq2YdJLEOJ+iNuJ0g0F8Cwavg2YtXmB0x0RG0Jr2mghLdRzoq0QXuqTyHT5y6gKguMEdTDgMzqfhLKmv1nfNcMN2vwbZj5E/H0C+EwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • watermark

    0

Signatures

  • Cobalt Strike reflective loader 1 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5b441509a2d319ed45c2c603f344b1e5f5def1c9d797eae039eece52c3839962.zip
    .zip

    Password: infected

  • 5b441509a2d319ed45c2c603f344b1e5f5def1c9d797eae039eece52c3839962
    .dll windows:5 windows x86 arch:x86

    Password: infected

    0225c318fe7efc6594032186ca51d3f0


    Headers

    Imports

    Exports

    Sections