General
-
Target
55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee
-
Size
628KB
-
Sample
241122-k3fb4stpaq
-
MD5
2e01e07dd7d228810126e8e449ffd97b
-
SHA1
144639db8ba3e7ce5ba03fa9c9cee61758e34de9
-
SHA256
55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee
-
SHA512
9cebf8f26da3cdb15dd01b275b030151f11c48a19a6c16274a50fb5d5099f6db3c77b9d9d4f7ab899ba9630a99ccdfa5702490c113978250584a00ec9fc92ad2
-
SSDEEP
12288:JAsWP4S+JJ91FEUPiNavGL+mRjTfFkbfp6OZr9JbFSBZ:yHYJJ97F6NSGLlRu4I4BZ
Static task
static1
Behavioral task
behavioral1
Sample
55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
cobaltstrike
0
http://178.132.4.150:80/owa/
-
access_type
512
-
host
178.132.4.150,/owa/
-
http_header1
AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAACGQ29va2llOiBNaWNyb3NvZnRBcHBsaWNhdGlvbnNUZWxlbWV0cnlEZXZpY2VJZD05NWMxOGQ4LTRkY2U5ODU0O0NsaWVudElkPTFDMEY2QzVEOTEwRjk7TVNQQXV0aD0zRWtBakRLakk7eGlkPTczMGJmNzt3bGE0Mj1aRzB5TXpBMktqRXMAAAAHAAAAAAAAAA0AAAAFAAAAAndhAAAACQAAAA5wYXRoPS9jYWxlbmRhcgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
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
-
http_method1
GET
-
http_method2
GET
-
jitter
5120
-
polling_time
30000
-
port_number
80
-
sc_process32
%windir%\syswow64\gpupdate.exe
-
sc_process64
%windir%\sysnative\gpupdate.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCnOM3nXx+7HBhkbDd+AwFrFisSunK999w2tM0uTpuuEiBalcJhcL+QgQWtf6S7zPp5hjImG+2YcPl18geU4f5JlSPXHwilbK4DFb/ePWyKFjhrA7emVRqhM21QMlo1ANsn14rY/RO2pzuft8P7TXoIjjI/B2GGVuzYNZX6X4I2EwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
1.448416512e+09
-
unknown2
AAAABAAAAA0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown3
1.610612736e+09
-
uri
/OWA/
-
user_agent
Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko)
-
watermark
0
Targets
-
-
Target
55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee
-
Size
628KB
-
MD5
2e01e07dd7d228810126e8e449ffd97b
-
SHA1
144639db8ba3e7ce5ba03fa9c9cee61758e34de9
-
SHA256
55d484eed1b9baf86dbf794d2f01725d17f39f792f181d183e8db8254d92b4ee
-
SHA512
9cebf8f26da3cdb15dd01b275b030151f11c48a19a6c16274a50fb5d5099f6db3c77b9d9d4f7ab899ba9630a99ccdfa5702490c113978250584a00ec9fc92ad2
-
SSDEEP
12288:JAsWP4S+JJ91FEUPiNavGL+mRjTfFkbfp6OZr9JbFSBZ:yHYJJ97F6NSGLlRu4I4BZ
Score10/10-
Cobaltstrike family
-
Suspicious use of SetThreadContext
-