General
-
Target
a81ee64e8286727988e63af022998e518fb23f17a3afc782f7fe7e417c6e2bf8
-
Size
688KB
-
Sample
240918-qlzmbasgjb
-
MD5
2568133b69fe9fc6270b9d96c405aece
-
SHA1
910e557be3e6315a34e194171c8ccf5498acc47b
-
SHA256
a81ee64e8286727988e63af022998e518fb23f17a3afc782f7fe7e417c6e2bf8
-
SHA512
03dd30665982b599f20d00fdcf4a460453dbd84acc61b584077382814120f6424e13127c215db2ffb06608277fa1dcc89311603445081dc5de5d2fc567a513df
-
SSDEEP
12288:juFVPZcd+QzkFJGi7f1XsntWsuohRawqiohc:8VPZcd+QzdiJXsnF2zm
Static task
static1
Behavioral task
behavioral1
Sample
a81ee64e8286727988e63af022998e518fb23f17a3afc782f7fe7e417c6e2bf8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a81ee64e8286727988e63af022998e518fb23f17a3afc782f7fe7e417c6e2bf8.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
cobaltstrike
0
http://192.168.125.1:8023/load
-
access_type
512
-
host
192.168.125.1,/load
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
maxdns
255
-
polling_time
60000
-
port_number
8023
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCAJgrD58wcHhpNqxew7EHFE8jXWLVYrbkaEf2SVwAWAUG44Rbt1akIIWO6lfkc+kTDoQ05Mq2YdJLEOJ+iNuJ0g0F8Cwavg2YtXmB0x0RG0Jr2mghLdRzoq0QXuqTyHT5y6gKguMEdTDgMzqfhLKmv1nfNcMN2vwbZj5E/H0C+EwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; UHS)
-
watermark
0
Targets
-
-
Target
a81ee64e8286727988e63af022998e518fb23f17a3afc782f7fe7e417c6e2bf8
-
Size
688KB
-
MD5
2568133b69fe9fc6270b9d96c405aece
-
SHA1
910e557be3e6315a34e194171c8ccf5498acc47b
-
SHA256
a81ee64e8286727988e63af022998e518fb23f17a3afc782f7fe7e417c6e2bf8
-
SHA512
03dd30665982b599f20d00fdcf4a460453dbd84acc61b584077382814120f6424e13127c215db2ffb06608277fa1dcc89311603445081dc5de5d2fc567a513df
-
SSDEEP
12288:juFVPZcd+QzkFJGi7f1XsntWsuohRawqiohc:8VPZcd+QzdiJXsnF2zm
Score10/10 -