General

  • Target

    02.08.202233.exe

  • Size

    218KB

  • Sample

    241006-qrffma1anc

  • MD5

    96c8c429bec2e2af943fdc6d71dc9774

  • SHA1

    4c90456f0291beb75429118fe2132550d4744840

  • SHA256

    7f32771d606d719c03ce1afe9ccccacf76c916ceaa6482c309b07d8ebb70a40a

  • SHA512

    2b99d308f4545a708efa4f67350e0cfd85a3894f36dbf240effb2ada39a15a0c4bb7970ade0063487f12e909a08cdbd26d4b43ff2202b86c01bd0193b891b2be

  • SSDEEP

    6144:TPe9AGcv1iHuTv+Vq7cKkxveld65nq4S96wbkXT:TPMjOrWq7cKkpA65n+63j

Score
10/10

Malware Config

Extracted

Family

cobaltstrike

Botnet

391144938

C2

http://154.9.253.10:8090/__utm.gif

Attributes
  • access_type

    512

  • host

    154.9.253.10,/__utm.gif

  • http_header1

    AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_header2

    AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_method1

    GET

  • http_method2

    POST

  • polling_time

    60000

  • port_number

    8090

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDxrkYPpM7Lnkw/Ok2dPebMswTcX0+lt56FvMCJUemyei96y21cHbKbiHtWvYDXJraJ4SAyr4bxsX2X+Cs6awxfjPmCONbWwlDMYjNuxgSB9i+ehKOEzOgRbIbyXbdDVLyog4Kpn1f5ktmk/EcyPMZVHHDCBtpZuxL6V3WwORRMjQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /submit.php

  • user_agent

    Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)

  • watermark

    391144938

Targets

    • Target

      02.08.202233.exe

    • Size

      218KB

    • MD5

      96c8c429bec2e2af943fdc6d71dc9774

    • SHA1

      4c90456f0291beb75429118fe2132550d4744840

    • SHA256

      7f32771d606d719c03ce1afe9ccccacf76c916ceaa6482c309b07d8ebb70a40a

    • SHA512

      2b99d308f4545a708efa4f67350e0cfd85a3894f36dbf240effb2ada39a15a0c4bb7970ade0063487f12e909a08cdbd26d4b43ff2202b86c01bd0193b891b2be

    • SSDEEP

      6144:TPe9AGcv1iHuTv+Vq7cKkxveld65nq4S96wbkXT:TPMjOrWq7cKkpA65n+63j

    Score
    1/10

MITRE ATT&CK Matrix

Tasks