General
-
Target
25119874c3beba9dd7bcdad53aca8fe379f82d9b20da133b1928a4ec4eb7ec7d
-
Size
576KB
-
Sample
240925-j3awysvapl
-
MD5
121b5713d96bbbb1c3ee424e6fc70646
-
SHA1
f2c96246a92a5665ca7574bcb4094c7a6b4cf6d2
-
SHA256
25119874c3beba9dd7bcdad53aca8fe379f82d9b20da133b1928a4ec4eb7ec7d
-
SHA512
1360224ced9d3b4a4ae3fdbeb05f7d0ea8e89968f931a4a22a220cf021f4a138de43e437b3cb6353f6c87e70fb1130e65c3b6b60927631b2079f5aa885bc6dd9
-
SSDEEP
12288:HCrsUxqU00tC3vHmswk3Ta77Hp0fWAUmBpmaNxlvYFLHqoOJ:Hzw00tbLUlvYFLHqoOJ
Static task
static1
Behavioral task
behavioral1
Sample
25119874c3beba9dd7bcdad53aca8fe379f82d9b20da133b1928a4ec4eb7ec7d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
25119874c3beba9dd7bcdad53aca8fe379f82d9b20da133b1928a4ec4eb7ec7d.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
cobaltstrike
http://103.214.174.101:50344/Dhy8
-
user_agent
User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/1.101
Extracted
cobaltstrike
100000
http://103.214.174.101:50344/ca_key
-
access_type
512
-
beacon_type
2048
-
host
103.214.174.101,/ca_key
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAZpZ25vcmUAAAAHAAAAAQAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
polling_time
60000
-
port_number
50344
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCDvyEIeDCdQampv3fNrMI67GK90rZIO9iMnFstPpIYFQulu0T2depwwqW1LU+Y+auWWsOet7Vxq8ClP+d3VukZosUh/z+cEtLuMyA83ICLvT9G3YeHnLKifuioLLKj35L9ZwiU581y9cERtk7ugmQMAtq5r8xn3oPlaQ9S/c4ZjQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
7.55044352e+08
-
unknown2
AAAABAAAAAEAAAA5AAAAAgAAAPQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/update_loads
-
user_agent
Windows-Update-Agent/10.0.10011.16384 Client-Protocol/1.101
-
watermark
100000
Targets
-
-
Target
25119874c3beba9dd7bcdad53aca8fe379f82d9b20da133b1928a4ec4eb7ec7d
-
Size
576KB
-
MD5
121b5713d96bbbb1c3ee424e6fc70646
-
SHA1
f2c96246a92a5665ca7574bcb4094c7a6b4cf6d2
-
SHA256
25119874c3beba9dd7bcdad53aca8fe379f82d9b20da133b1928a4ec4eb7ec7d
-
SHA512
1360224ced9d3b4a4ae3fdbeb05f7d0ea8e89968f931a4a22a220cf021f4a138de43e437b3cb6353f6c87e70fb1130e65c3b6b60927631b2079f5aa885bc6dd9
-
SSDEEP
12288:HCrsUxqU00tC3vHmswk3Ta77Hp0fWAUmBpmaNxlvYFLHqoOJ:Hzw00tbLUlvYFLHqoOJ
Score10/10 -