Malware Analysis Report

2024-10-19 06:22

Sample ID 240909-qk9qwszdpq
Target a6af2d4cce72dd9fa8499bc2935644821e50c0f76c931a5432cdfc807561af1a
SHA256 a6af2d4cce72dd9fa8499bc2935644821e50c0f76c931a5432cdfc807561af1a
Tags
cobaltstrike 100000 backdoor trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

a6af2d4cce72dd9fa8499bc2935644821e50c0f76c931a5432cdfc807561af1a

Threat Level: Known bad

The file a6af2d4cce72dd9fa8499bc2935644821e50c0f76c931a5432cdfc807561af1a was found to be: Known bad.

Malicious Activity Summary

cobaltstrike 100000 backdoor trojan

Cobaltstrike

Unsigned PE

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-09-09 13:20

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-09-09 13:20

Reported

2024-09-09 13:22

Platform

win7-20240903-en

Max time kernel

118s

Max time network

119s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a6af2d4cce72dd9fa8499bc2935644821e50c0f76c931a5432cdfc807561af1a.exe"

Signatures

Cobaltstrike

trojan backdoor cobaltstrike

Processes

C:\Users\Admin\AppData\Local\Temp\a6af2d4cce72dd9fa8499bc2935644821e50c0f76c931a5432cdfc807561af1a.exe

"C:\Users\Admin\AppData\Local\Temp\a6af2d4cce72dd9fa8499bc2935644821e50c0f76c931a5432cdfc807561af1a.exe"

Network

Country Destination Domain Proto
HK 212.192.12.15:7758 212.192.12.15 tcp
HK 212.192.12.15:7758 212.192.12.15 tcp
HK 212.192.12.15:7758 212.192.12.15 tcp
HK 212.192.12.15:7758 212.192.12.15 tcp
HK 212.192.12.15:7758 212.192.12.15 tcp
HK 212.192.12.15:7758 212.192.12.15 tcp
HK 212.192.12.15:7758 212.192.12.15 tcp
HK 212.192.12.15:7758 212.192.12.15 tcp

Files

memory/2492-0-0x00000000003F0000-0x00000000003F1000-memory.dmp

memory/2492-2-0x000000002A6B0000-0x000000002AB22000-memory.dmp

memory/2492-3-0x000000002A2B0000-0x000000002A6B0000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-09-09 13:20

Reported

2024-09-09 13:22

Platform

win10v2004-20240802-en

Max time kernel

114s

Max time network

119s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a6af2d4cce72dd9fa8499bc2935644821e50c0f76c931a5432cdfc807561af1a.exe"

Signatures

Cobaltstrike

trojan backdoor cobaltstrike

Processes

C:\Users\Admin\AppData\Local\Temp\a6af2d4cce72dd9fa8499bc2935644821e50c0f76c931a5432cdfc807561af1a.exe

"C:\Users\Admin\AppData\Local\Temp\a6af2d4cce72dd9fa8499bc2935644821e50c0f76c931a5432cdfc807561af1a.exe"

Network

Country Destination Domain Proto
HK 212.192.12.15:7758 212.192.12.15 tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 15.12.192.212.in-addr.arpa udp
US 8.8.8.8:53 81.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 138.32.126.40.in-addr.arpa udp
HK 212.192.12.15:7758 212.192.12.15 tcp
HK 212.192.12.15:7758 212.192.12.15 tcp
HK 212.192.12.15:7758 212.192.12.15 tcp
HK 212.192.12.15:7758 212.192.12.15 tcp
HK 212.192.12.15:7758 212.192.12.15 tcp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
HK 212.192.12.15:7758 212.192.12.15 tcp
HK 212.192.12.15:7758 212.192.12.15 tcp
HK 212.192.12.15:7758 212.192.12.15 tcp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 217.135.221.88.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 73.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp

Files

memory/4816-0-0x0000022920980000-0x0000022920981000-memory.dmp

memory/4816-2-0x0000022947F30000-0x0000022948330000-memory.dmp

memory/4816-1-0x0000022948330000-0x00000229487A2000-memory.dmp