General
-
Target
ac5c3fb73b8cbeb67efd43a7dbb284ea5bc776641d14fc155b0fe0dae3440640.zip
-
Size
130KB
-
Sample
240920-tf86cavgkk
-
MD5
70596d1042003b457b5856583697386e
-
SHA1
5c1ec5b4fd3dad787479747accd76caeaa0f4b4f
-
SHA256
8db4146a8366dd6927f3ee74c1e1c311ea3d931a177015ff5ae3a8c165b383e3
-
SHA512
6c71c6bafcbbfc5ecdff9c09510c5881c1938610865f61269128370fc0e9c54ab223052f90e6fbc6112c7db024a40fb93cecddfcbc0d89bac07f2bb9d59e3a33
-
SSDEEP
3072:bnVEBVtdQLSbPd4D1h+LCKOnGAV3qyVoU7imUWJTPL:bnVEzQM8iLCKOnd3qOb7imUWVPL
Behavioral task
behavioral1
Sample
ac5c3fb73b8cbeb67efd43a7dbb284ea5bc776641d14fc155b0fe0dae3440640.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ac5c3fb73b8cbeb67efd43a7dbb284ea5bc776641d14fc155b0fe0dae3440640.dll
Resource
win10v2004-20240802-en
Malware Config
Extracted
cobaltstrike
391144938
http://83.229.127.173:8888/push
-
access_type
512
-
host
83.229.127.173,/push
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
polling_time
60000
-
port_number
8888
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCqew7e52ZnWZsV4xxsBF/eoDIfL9Lmo9uRfl5gYcfruvXPlr/36JtmbOddR4LV6tBo76pODHp5d5QcZWOSENfPgk4J/OexZCYy+jn8tTbVW3x1w8cREQ8RXinID7sC/2IqH++73YzYK3ETc7VWjDv1vRjcG9BXmPHehIp85lkBUQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0; BOIE9;ENUS)
-
watermark
391144938
Extracted
cobaltstrike
0
-
watermark
0
Targets
-
-
Target
ac5c3fb73b8cbeb67efd43a7dbb284ea5bc776641d14fc155b0fe0dae3440640
-
Size
272KB
-
MD5
d9487d281422d6bfd47a3465a53662ed
-
SHA1
86a65c81b8a7f1247a9fc2053a9836c12d8f69f8
-
SHA256
ac5c3fb73b8cbeb67efd43a7dbb284ea5bc776641d14fc155b0fe0dae3440640
-
SHA512
3c8110c90e2add98e75c467df96b4858a9689ac9984633bf2da49ae88d8be44da3c6c083c36afd6f8284030d7b8951d5f5e12d2cb3632b33f151a6b9da736a91
-
SSDEEP
3072:rzbINhWl+CIbfqqEVxtfg8jtfDCJS4l9JTFyG+JteEzCnL7zxGIkfhUYJF6vzHkM:rzbUWootfDCvT4ZTXzCLcIk5UDnrKM
Score10/10 -