General
-
Target
7d3b63c7f726a998306adef909ac6c7eefda0853c384aa528cf074e5b5bc78d1.zip
-
Size
130KB
-
Sample
240917-lh2kaawcmj
-
MD5
b5ab124fa3f28383112e1e6879dfc2d2
-
SHA1
116a51b75cf78d8dc20114cecb468b6c9ad7f153
-
SHA256
2dd542dd7f7dbfcf0990a2041e23726a291c816fd8dd43cdde69545098ec0cc8
-
SHA512
d8cf58a1f7342374529e3cf3e12d02b4312c002c1856ea931b84246b22875174ea7c83af9e76c39f1f08d5b0f44b396636b081d887c67170b5e4202955560e28
-
SSDEEP
3072:t0zXL+uQC1iy7fcutNCTK0uFTaM2DYHodX2zJqMv8YwJmKz7B:t0zXOCsyTcubCTK0uEPYHWX+Z8HJl7B
Behavioral task
behavioral1
Sample
7d3b63c7f726a998306adef909ac6c7eefda0853c384aa528cf074e5b5bc78d1.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7d3b63c7f726a998306adef909ac6c7eefda0853c384aa528cf074e5b5bc78d1.dll
Resource
win10v2004-20240802-en
Malware Config
Extracted
cobaltstrike
391144938
http://192.168.252.134:81/fwlink
-
access_type
512
-
host
192.168.252.134,/fwlink
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
polling_time
60000
-
port_number
81
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDV2BWzhnxJG+AymmTTEt9md0wdZIgbUhZaOhFgtqxgwTbCJQrISLG4uGPF0V3OtLiEicSEP83dMvSht17rIO3oqikrOqqEzYju/y4nmCjHn9Wj4pY9zd5MPDCl/cZv5MI6flQG7MIxFpNDe7zdAg30TRVHnH4hldXuc1sMx+n+RQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; MANM)
-
watermark
391144938
Extracted
cobaltstrike
0
-
watermark
0
Targets
-
-
Target
7d3b63c7f726a998306adef909ac6c7eefda0853c384aa528cf074e5b5bc78d1
-
Size
272KB
-
MD5
b8dbfeab2a84d5becb52acdadd803e2a
-
SHA1
be565269983ba8af98804d3b3eeb47c846be13fa
-
SHA256
7d3b63c7f726a998306adef909ac6c7eefda0853c384aa528cf074e5b5bc78d1
-
SHA512
7f98350f2b9eeb58ff6ce57d32e52a19dfa93d69321dab2a30599248fdc2a3fe9a48d7563d398b70ea9dae594336cc915787675759992e88ff780ce1462d61a8
-
SSDEEP
3072:rzbINhWl+CIbfqqEVxtfg8jtfDCJS4l9JTFyG+JteEzCnL7zjGIkfhUYJF6vzHkU:rzbUWootfDCvT4ZTXzCLaIk5UDnrKM
Score10/10 -