General

  • Target

    2d4c0b8a013f21d11f96b686dc1e87eb42dbd875ab0db124a9dd3ffb82d78ac8

  • Size

    256KB

  • MD5

    c831bfc9557199784c044425401b9c92

  • SHA1

    30ea479e0db85d4c41e5ab4469551ed47fc6d36d

  • SHA256

    2d4c0b8a013f21d11f96b686dc1e87eb42dbd875ab0db124a9dd3ffb82d78ac8

  • SHA512

    3e3bd7dec051e4e0d46ec9488895ac4f2fd50d7b8d5deb176095096d57404a8d081db2ac81f3f5dfa2106a738a8446774f316cac501dc0c55a9f88f558729d75

  • SSDEEP

    3072:qc0nsHpyvGj346lbkBN/gppj8aJGIhxjT3A8ygbLAZmitdGlZ9tQYJ1b/S1Pd83B:qc0bPzIpt8ahTw8PHA8itQnQvquE

Score
10/10

Malware Config

Extracted

Family

cobaltstrike

Botnet

426352781

C2

http://service-cao57eu9-1300400844.cd.apigw.tencentcs.com:443/script/VUE/src/main.js

Attributes
  • access_type

    512

  • beacon_type

    2048

  • host

    service-cao57eu9-1300400844.cd.apigw.tencentcs.com,/script/VUE/src/main.js

  • http_header1

    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

  • http_header2

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAcAAAAAAAAAAwAAAAIAAAAJSlNFU1NJT049AAAABgAAAAZDb29raWUAAAAHAAAAAQAAAAMAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_method1

    GET

  • http_method2

    POST

  • polling_time

    3000

  • port_number

    443

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCAuLVvoqAi9uBYCheYH3biYrZLzndgmb/1ZXW/L5at0mhNGZj4KBdqBwp4PyT/P2qowNyvKXOOxSNqZOSMUhwGKRJraJzWV2UK8gCyUMaMhg6NhNsffqhy6nGq6zFhup9bkUeH/dpIX2FsXJoT1wOo729nqjqqOqwllTPb3+PYwwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    1.481970944e+09

  • unknown2

    AAAABAAAAAMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /api/postit

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:87.0) Gecko/20100101 Firefox/87.0

  • watermark

    426352781

Signatures

  • Cobaltstrike family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2d4c0b8a013f21d11f96b686dc1e87eb42dbd875ab0db124a9dd3ffb82d78ac8
    .dll windows:5 windows x64 arch:x64

    aa81c1b260a0efe3cd2c26c7046b78ed


    Headers

    Imports

    Exports

    Sections