General

  • Target

    c3c1338eaa4025e765e84b85e277ed5a319a7d732ff2054b67aba83578386825.exe

  • Size

    289KB

  • Sample

    240829-cld4qaycpd

  • MD5

    3f167a4cb8b366843fc3547f7f564fa4

  • SHA1

    20a3b47c2415856fd9ff8d8a61b376c85f6c6b52

  • SHA256

    c3c1338eaa4025e765e84b85e277ed5a319a7d732ff2054b67aba83578386825

  • SHA512

    5fbcafc50bd0d76d121cc9991a25e0eeb39da2fa87429744251e605a689d699133c12227c000c2ed2732f5809c1b482cb1f4cbe7955e22480a1d65be08b42184

  • SSDEEP

    6144:mzJ8qdZGPkZBzxWT//G1dyUG+EjHpDHWS3pIjk:mzfKwBO/qdyUAHB1Ig

Malware Config

Extracted

Family

cobaltstrike

Botnet

391144938

C2

http://47.99.72.48:9898/cm

Attributes
  • access_type

    512

  • host

    47.99.72.48,/cm

  • http_header1

    AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_header2

    AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_method1

    GET

  • http_method2

    POST

  • polling_time

    60000

  • port_number

    9898

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCWTRSy+lcQ/aN2IvR3URsb3j28DXhUNy3NkEPdNrMTpnQs1R3NeGNZ7ySVVzSznV6WWZa/2c214GpyfVEk317h+BNy9RKeCmw7V/mSkRXVWqEEdC9kOHL11HuJRpGpORSxWHlozRYYHe+bUiVGv85zmCGoO4gv//4r69zUVyO9vwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /submit.php

  • user_agent

    Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; FunWebProducts)

  • watermark

    391144938

Targets

    • Target

      c3c1338eaa4025e765e84b85e277ed5a319a7d732ff2054b67aba83578386825.exe

    • Size

      289KB

    • MD5

      3f167a4cb8b366843fc3547f7f564fa4

    • SHA1

      20a3b47c2415856fd9ff8d8a61b376c85f6c6b52

    • SHA256

      c3c1338eaa4025e765e84b85e277ed5a319a7d732ff2054b67aba83578386825

    • SHA512

      5fbcafc50bd0d76d121cc9991a25e0eeb39da2fa87429744251e605a689d699133c12227c000c2ed2732f5809c1b482cb1f4cbe7955e22480a1d65be08b42184

    • SSDEEP

      6144:mzJ8qdZGPkZBzxWT//G1dyUG+EjHpDHWS3pIjk:mzfKwBO/qdyUAHB1Ig

MITRE ATT&CK Matrix

Tasks