General

  • Target

    6676292405c8f52b455f7407fadc50fcf08287c9bb189a0c0e313273a08d48fc

  • Size

    289KB

  • Sample

    240910-rr4c5ayhpa

  • MD5

    a6d2c55deebbbd2211ce1d4e959a1eb5

  • SHA1

    9a8890e85ad7c6d96b538f825826b7f892c9a7fe

  • SHA256

    6676292405c8f52b455f7407fadc50fcf08287c9bb189a0c0e313273a08d48fc

  • SHA512

    13d7c9f26a5ac4bae9754b736896c289785abdfedacb9bebd92e04cb1ce71643247e4bca6dcbad1dcfbd3a45ba09bae41ff791d2f5dd40a78b676a9f04f65a57

  • SSDEEP

    6144:HAMknXZIqu3SmUZ/ESajgeFszVhHPHdpT6wcl:HAMKZIqYSmm/ESIgeuzVhHP9QZ

Malware Config

Extracted

Family

cobaltstrike

Botnet

391144938

C2

http://192.168.135.128:80/en_US/all.js

Attributes
  • access_type

    512

  • host

    192.168.135.128,/en_US/all.js

  • http_header1

    AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_header2

    AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_method1

    GET

  • http_method2

    POST

  • polling_time

    60000

  • port_number

    80

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCKgwTbFjFJJQlLaKWljBl7XLODlnMGIj9Jhw1lwPYk2mQpNzwfhXFVnlR88Aeg4YNra2wQOjjawPEHroV1FjqYznobvD7wnzwyiw6Mi4WwQZpj5/65ecd5fqb6RszVlu1B5KllO0Z9VnkOOxiPqoJPIXu5SNn9CaRLOMdEdSZTUwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /submit.php

  • user_agent

    Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)

  • watermark

    391144938

Targets

    • Target

      6676292405c8f52b455f7407fadc50fcf08287c9bb189a0c0e313273a08d48fc

    • Size

      289KB

    • MD5

      a6d2c55deebbbd2211ce1d4e959a1eb5

    • SHA1

      9a8890e85ad7c6d96b538f825826b7f892c9a7fe

    • SHA256

      6676292405c8f52b455f7407fadc50fcf08287c9bb189a0c0e313273a08d48fc

    • SHA512

      13d7c9f26a5ac4bae9754b736896c289785abdfedacb9bebd92e04cb1ce71643247e4bca6dcbad1dcfbd3a45ba09bae41ff791d2f5dd40a78b676a9f04f65a57

    • SSDEEP

      6144:HAMknXZIqu3SmUZ/ESajgeFszVhHPHdpT6wcl:HAMKZIqYSmm/ESIgeuzVhHP9QZ

MITRE ATT&CK Matrix

Tasks