General
-
Target
c1d01a60103f4008417a1847a7f9cda22d06eb4e0555868cf396c0e514092f91
-
Size
256KB
-
Sample
240908-rtv5jatbmh
-
MD5
9047030e1f25bf9943c9017da0153b48
-
SHA1
4462046de76d91eb10746a921be62975edaf7676
-
SHA256
c1d01a60103f4008417a1847a7f9cda22d06eb4e0555868cf396c0e514092f91
-
SHA512
b13bf4f782e5111c6948c3cbabb017a292a0ffea80e40214b2733c445e39aadce4240c3219a1b122d72628c7070a2e805de0c77af6fd5199e71a2d31462fc202
-
SSDEEP
3072:7c0nsHpyvGj346lbkBN/gppj8aJGIhxjT3A8ygbLAZmitdGlr9tQYJ1b/S1PDy8C:7c0bPzIpt8ahTw8PHA8itQZQvWuE
Behavioral task
behavioral1
Sample
c1d01a60103f4008417a1847a7f9cda22d06eb4e0555868cf396c0e514092f91.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c1d01a60103f4008417a1847a7f9cda22d06eb4e0555868cf396c0e514092f91.dll
Resource
win10v2004-20240802-en
Malware Config
Extracted
cobaltstrike
426352781
http://39.103.157.206:8822/j.ad
-
access_type
512
-
host
39.103.157.206,/j.ad
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
polling_time
60000
-
port_number
8822
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCpgBDx1biqoJRZbWqptVv/KmVGBx0iPuD2oGkfqkuTXtMNK5SZ6RJ0bv7yXjLWInQPhc+0xU91gL4Vu/x9Rqp7vzO0hkNxNbQbKiypxcwSVG0DcdjvSgprHuA7rVmgE+9J/oKm8RCsehXmfDn6LLF01uc2oWYB0Jps1tF4abVjFQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; LBBROWSER)
-
watermark
426352781
Targets
-
-
Target
c1d01a60103f4008417a1847a7f9cda22d06eb4e0555868cf396c0e514092f91
-
Size
256KB
-
MD5
9047030e1f25bf9943c9017da0153b48
-
SHA1
4462046de76d91eb10746a921be62975edaf7676
-
SHA256
c1d01a60103f4008417a1847a7f9cda22d06eb4e0555868cf396c0e514092f91
-
SHA512
b13bf4f782e5111c6948c3cbabb017a292a0ffea80e40214b2733c445e39aadce4240c3219a1b122d72628c7070a2e805de0c77af6fd5199e71a2d31462fc202
-
SSDEEP
3072:7c0nsHpyvGj346lbkBN/gppj8aJGIhxjT3A8ygbLAZmitdGlr9tQYJ1b/S1PDy8C:7c0bPzIpt8ahTw8PHA8itQZQvWuE
Score1/10 -