General

  • Target

    41f9ef15c751ed4733f7cbc71599dfeb_JaffaCakes118

  • Size

    206KB

  • MD5

    41f9ef15c751ed4733f7cbc71599dfeb

  • SHA1

    f8afa38d2603bad7002cd71a59326bd548156c14

  • SHA256

    25ee735dff8610840b565ecebaf74ad30e3096b859807616ce2a9279bdb5b997

  • SHA512

    d2d754e319a97c9f03a692d34f1ac1f4700bb113d808258005132f102713cdfce821c16c1cebfe629168ce0a7b080fe402bc960510ab72c671ae72669eec0d04

  • SSDEEP

    3072:nryYXMJJciFoSYMoXYQlwfv/gF8jua3PX4Ns5drwolUtiL59uN:lXkiq4wfv4Kjnv+srwofE

Score
10/10

Malware Config

Extracted

Family

cobaltstrike

Botnet

0

C2

http://185.80.92.4:9797/ca

Attributes
  • access_type

    512

  • crypto_scheme

    256

  • host

    185.80.92.4,/ca

  • http_header1

    AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_header2

    AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_method1

    GET

  • http_method2

    POST

  • maxdns

    255

  • pipe_name

    \\%s\pipe\msagent_%x

  • polling_time

    60000

  • port_number

    9797

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDDE57ppXv4CLwKzFQQLDyu1ky37pGF7nnK1ak3yE+l6i2uB3tb+9x8MTWaa7rZ3TKO6RRm1bIGrhBuCVlkMH0hKOcxriBucfY3tu+cZU4vP+edeoe/Hp9ugUUOexiPOuTYmK9vI0gvfzOkRy8z4s3BEWJ7O6Gk4mZjwioV5ybOSwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /submit.php

  • user_agent

    Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 2.0.50727; InfoPath.2)

  • watermark

    0

Signatures

  • Cobaltstrike family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 41f9ef15c751ed4733f7cbc71599dfeb_JaffaCakes118
    .dll windows:5 windows x86 arch:x86

    0bc418575efc832b308d227b31192688


    Headers

    Imports

    Exports

    Sections