Overview
overview
10Static
static
3coba164.exe
windows7-x64
10coba164.exe
windows10-2004-x64
10coba164s.exe
windows7-x64
10coba164s.exe
windows10-2004-x64
10coba186.exe
windows7-x64
10coba186.exe
windows10-2004-x64
10coba186s.exe
windows7-x64
1coba186s.exe
windows10-2004-x64
10cobabecx86.exe
windows7-x64
3cobabecx86.exe
windows10-2004-x64
10cobabehttpx86.exe
windows7-x64
3cobabehttpx86.exe
windows10-2004-x64
10cobahttpx86.exe
windows7-x64
3cobahttpx86.exe
windows10-2004-x64
10cobasslx64.exe
windows7-x64
1cobasslx64.exe
windows10-2004-x64
10cobasx86.exe
windows7-x64
10cobasx86.exe
windows10-2004-x64
10cobax86_408.exe
windows7-x64
10cobax86_408.exe
windows10-2004-x64
10General
-
Target
JaffaCakes118_88cfede42188d89c02902431f688fd90b5947eb2155f6b40a1f75f3cfc010e2b
-
Size
7.0MB
-
Sample
241230-chxfwstqgs
-
MD5
891ec166da139cd00c0342441c18e055
-
SHA1
ed3b9c99e70d9076d208022c412e30987d357613
-
SHA256
88cfede42188d89c02902431f688fd90b5947eb2155f6b40a1f75f3cfc010e2b
-
SHA512
b02bbd40525574967f2881d6d85626c9b872a7430365642777db0c11fc910cec2bacea10fc441082d049f86d1cd3833ca90c8d16426f47da395e5ab6b8b51e59
-
SSDEEP
196608:z65gfXC73iV8ujsQKJScOkBNDee7buKVGJ:zrfSzV3Ssbp7bx4
Static task
static1
Behavioral task
behavioral1
Sample
coba164.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
coba164.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
coba164s.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
coba164s.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
coba186.exe
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
coba186.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
coba186s.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
coba186s.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
cobabecx86.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
cobabecx86.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
cobabehttpx86.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
cobabehttpx86.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
cobahttpx86.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
cobahttpx86.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
cobasslx64.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
cobasslx64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
cobasx86.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
cobasx86.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
cobax86_408.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
cobax86_408.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
cobaltstrike
http://217.12.218.46:80/YPbR
http://1nevadasports.com:443/erDB
-
user_agent
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
Extracted
cobaltstrike
305419896
http://goodgish.com:443/jquery-3.3.1.min.js
http://195.123.217.12:80/jquery-3.3.1.min.js
-
access_type
512
-
beacon_type
2048
-
dns_idle
2.15579587e+08
-
host
goodgish.com,/jquery-3.3.1.min.js
-
http_header1
AAAACgAAAEdBY2NlcHQ6IHRleHQvaHRtbCxhcHBsaWNhdGlvbi94aHRtbCt4bWwsYXBwbGljYXRpb24veG1sO3E9MC45LCovKjtxPTAuOAAAAAoAAAAgUmVmZXJlcjogaHR0cDovL2NvZGUuanF1ZXJ5LmNvbS8AAAAKAAAAHkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQAAAAcAAAAAAAAADQAAAAIAAAAJX19jZmR1aWQ9AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAEdBY2NlcHQ6IHRleHQvaHRtbCxhcHBsaWNhdGlvbi94aHRtbCt4bWwsYXBwbGljYXRpb24veG1sO3E9MC45LCovKjtxPTAuOAAAAAoAAAAgUmVmZXJlcjogaHR0cDovL2NvZGUuanF1ZXJ5LmNvbS8AAAAKAAAAHkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQAAAAcAAAAAAAAADwAAAA0AAAAFAAAACF9fY2ZkdWlkAAAABwAAAAEAAAAPAAAADQAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
jitter
9472
-
maxdns
255
-
polling_time
45000
-
port_number
443
-
sc_process32
%windir%\syswow64\dllhost.exe
-
sc_process64
%windir%\sysnative\dllhost.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDCT42RZXDkOt4TBaANg7RggQbQZgKIt9JoHuhWGb5HcZdWd3ZmoqFQuFJ53NsjMvGrDkwxGokAV2GaGhCCb1GHK1NigI6uBcokE6seiXhny94nDmEEu4EEdYyFgLrsswJ04NA8tnIQD11iUz7XxzwocHN1161Yj66YCBK61DUomQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4.234810624e+09
-
unknown2
AAAABAAAAAEAAAXyAAAAAgAAAFQAAAACAAAPWwAAAA0AAAAPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/jquery-3.3.2.min.js
-
user_agent
Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko
-
watermark
305419896
Extracted
metasploit
windows/download_exec
http://195.123.217.12:80/jquery-3.3.1.slim.min.js
http://goodgish.com:443/jquery-3.3.1.slim.min.js
http://globalpressinfo.com:443/jquery-3.3.1.slim.min.js
http://217.12.218.46:80/1tjM
http://1nevadasports.com:443/NDQy
- headers Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Referer: http://code.jquery.com/ Accept-Encoding: gzip, deflate User-Agent: Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko
Extracted
cobaltstrike
305419896
http://goodgish.com:443/jquery-3.3.1.min.js
-
access_type
512
-
beacon_type
2048
-
dns_idle
2.15579587e+08
-
host
goodgish.com,/jquery-3.3.1.min.js
-
http_header1
AAAACgAAAEdBY2NlcHQ6IHRleHQvaHRtbCxhcHBsaWNhdGlvbi94aHRtbCt4bWwsYXBwbGljYXRpb24veG1sO3E9MC45LCovKjtxPTAuOAAAAAoAAAAgUmVmZXJlcjogaHR0cDovL2NvZGUuanF1ZXJ5LmNvbS8AAAAKAAAAHkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQAAAAcAAAAAAAAADQAAAAIAAAAJX19jZmR1aWQ9AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAACgAAAEdBY2NlcHQ6IHRleHQvaHRtbCxhcHBsaWNhdGlvbi94aHRtbCt4bWwsYXBwbGljYXRpb24veG1sO3E9MC45LCovKjtxPTAuOAAAAAoAAAAgUmVmZXJlcjogaHR0cDovL2NvZGUuanF1ZXJ5LmNvbS8AAAAKAAAAHkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQAAAAcAAAAAAAAADwAAAA0AAAAFAAAACF9fY2ZkdWlkAAAABwAAAAEAAAAPAAAADQAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_method1
GET
-
http_method2
POST
-
jitter
9472
-
maxdns
255
-
polling_time
45000
-
port_number
443
-
sc_process32
%windir%\syswow64\dllhost.exe
-
sc_process64
%windir%\sysnative\dllhost.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDCT42RZXDkOt4TBaANg7RggQbQZgKIt9JoHuhWGb5HcZdWd3ZmoqFQuFJ53NsjMvGrDkwxGokAV2GaGhCCb1GHK1NigI6uBcokE6seiXhny94nDmEEu4EEdYyFgLrsswJ04NA8tnIQD11iUz7XxzwocHN1161Yj66YCBK61DUomQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4.234810624e+09
-
unknown2
AAAABAAAAAEAAAXyAAAAAgAAAFQAAAACAAAPWwAAAA0AAAAPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/jquery-3.3.2.min.js
-
user_agent
Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko
-
watermark
305419896
Targets
-
-
Target
coba164.exe
-
Size
318KB
-
MD5
f5b735e40d63c8a0eff9c64131efdb2f
-
SHA1
54666928682558b67f89a5c320f16b8650cc8d90
-
SHA256
478fce8dc2caf098beb2dd5695fdf57ab5117b36e53d92ec8de137b5138aa80c
-
SHA512
620ffdd28973a6078356b1090e6d0f207246686a3e270caf62b0c4d7b912602c83c15468abe340846123fb427cc2d29bb2b04fae7721672b721698653cbd6c5d
-
SSDEEP
6144:buEmSCZP781jWoYYMH7UtnvGu++vqIAJW8iocoEikKqn6Q:1678koYZUtg+vqICeroF2nl
Score10/10-
Cobaltstrike family
-
-
-
Target
coba164s.exe
-
Size
318KB
-
MD5
1715d2b27d963988cac67a955812e4d0
-
SHA1
8831d9c375b0f3df5e40731d091d468d5764dad2
-
SHA256
d61f250ce0bc5dd194878de7495bf657bf9749ead64130935c24b7b12978e683
-
SHA512
ea5a9a8266cba81ec3232c1ae41897f8ef6972851c15cb51fd364ee895f4edcff2e62babef8a278560e17b33e639ab1b0024c1de7024d4d0b3180f60adb1acc0
-
SSDEEP
6144:4FKitXrJ6qUIbupzBTk1TRnK+kuuEci72o0i/p1IEh:OstIeBTcK+kuuFFo0l
Score10/10-
Cobaltstrike family
-
-
-
Target
coba186.exe
-
Size
256KB
-
MD5
b08152a9426f1453e466d4026fc6d1db
-
SHA1
93e3defbf52344e05ea4e0cb63373f8f5fa2c3f7
-
SHA256
c8e5dc8cf704b2c8f339ac43610d8c20d3d00fd8f1a3296cb288f644236d9583
-
SHA512
fdd2de24b673deeb3e58569d802213bba7aeccd7699d5edafafb6d96ca7c5116b4803c4c9b57994678a57d8aa66a7ccbda7b366a7b336385a0e2fd4bc0adb9df
-
SSDEEP
6144:mK/BF7FuCc1XWSMO1YWTDDRLJtiqAiveAONCyh2Dst:mQBuCc1XlMO1YWTnBiqAiGXCyYs
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
-
-
Target
coba186s.exe
-
Size
256KB
-
MD5
93bac4f33045a02c34e48ef3fdffdb2f
-
SHA1
17225c1f602f19396f4aa2628deba1fe9680e3c1
-
SHA256
992b42d1d6d4685e2821e7316ea403aed10b38bfe1879a0eca241a23f74d0269
-
SHA512
0638a120ee9e131d0ef91111b75ed106d16cf87a79a21ebf388d360dd5d8840ca1c63b3c87d58704b16e3807eed942220980d8c01afe9db8cf0b4c547ef025e9
-
SSDEEP
6144:NGxnghuicwAAMWrrloCwLackBYDIePeAOemHJyg9Fws3b:OghuicwASloCwLa4IemcMws3
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
-
-
Target
cobabecx86.exe
-
Size
3.0MB
-
MD5
f14dc05a209a93c4afa1f67d214dc5e5
-
SHA1
90c674231824d0bd7fbe78fa2fb3ae53b8fdab8f
-
SHA256
13709d93be7a32fed69a6334b16488e172566679a4d950335963f7f438a77d29
-
SHA512
09ce80c1571de439b40c73f48bdf5c595461b266f5e2a3c36b235d4a42e33019d812ec46785f265a99451a56afe0b1050604f47096684b9d4ed1a83451ba10cb
-
SSDEEP
49152:69o5tIl1QWRgDJik7Ibaw7jHgDLESqfQC+NR7Qd6WygCZeiYAzcrzUR80ex5dj6b:69o5tIl1QCgliQIOg4OURsx5kwQFIOBN
Score10/10-
Cobaltstrike family
-
-
-
Target
cobabehttpx86.exe
-
Size
3.0MB
-
MD5
e1e8c1f522869f486b89e77c05d45ba3
-
SHA1
e975b3aa9a1f47ae11d078caf5863c8de272a724
-
SHA256
7ee3baef75f367c136e7d1a3fb829cb381dd9ad9cc4b3ca46da1dd1c1976e394
-
SHA512
bbda0dba35cebd32b25e08c2430ce772bdd643a7e7187eed638eea453afae9f33249db93953fb36d2280ac50656612dcf6047553e1162b209263d92e77690628
-
SSDEEP
49152:qAq5iCl58uwrrZb7/HHN7DHgjLESKfQCbNxt0MiEeg28riYAzcrzUR80ex5dj65R:qAq5iCl58Lrtb7/sgmOURsx5UwQFNQMJ
Score10/10-
Cobaltstrike family
-
-
-
Target
cobahttpx86.exe
-
Size
2.7MB
-
MD5
5415d117067af06eca07d3eca2a77577
-
SHA1
6e018746c810c88adf7bccf570ff240056988c84
-
SHA256
5e6466283d75f4fdfb6dc2c6a6b249c441f0692c3a82521024fe53a19749c35e
-
SHA512
dcbcb53099cb0bb49e8538692fd20a96b152a791bb43a2c064f73145be38bdfac3b6388ab7144813fc6f58e8ce77afb2c46a00644c09f4e2d2244de56dea95c7
-
SSDEEP
49152:Ws6o30lU0jmz+3lnSvNw7jHgDLEShfQCmNm6AMd6grmevOZVer3U5E0ev5N0aGI8:Ws6o30lU0w+VnSvgwAU5Uv5QIZFpGHB3
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
-
-
Target
cobasslx64.exe
-
Size
3.8MB
-
MD5
e59fb03e91165f508223a27dfdfff0b0
-
SHA1
46a8c17f3155cfbf5fb1c871954c9697322aeb28
-
SHA256
3c6390e8c2eb4264e5a56a777110022ca533c3fa42ec0619151de6e2f9929a0a
-
SHA512
14120923cd2104dd354c80f24de32c11a45100373c6e810b45c37554340fada3b0cddb7edb8823e544535c0eafd926dbdb9897e08a089b187959543cd9d1fcc3
-
SSDEEP
49152:rkfRcO0CvVN8otW/bFw6vPnLv6TUJPsE1:YaWVSotWTp3LxyO
Score10/10-
Cobaltstrike family
-
-
-
Target
cobasx86.exe
-
Size
2.7MB
-
MD5
af6732e05c0d12769e6742d46376ab08
-
SHA1
5850da9662e53e36f66ca932bf80786ac39f544f
-
SHA256
ebfd43ae62687f69b4bcec5aa9a6328d2d405a2b7c00c4929df18ae444460852
-
SHA512
655deb4b098c3edc55d847cbdfd9efcb903a140e19d83445b1091bd8b6e6d85c1e9f163aec2f130f9fee82cc25e2f15e44b379d1ca741719ed3bdd47ebb8341f
-
SSDEEP
49152:2s6o30lU0jmz+3lnSvNw7jHgDLEShfQCmNm6AMd6grmevOZVer3U5E0ev5N0aGIL:2s6o30lU0w+VnSvgwAU5Uv5QIZFpGQBb
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
-
-
Target
cobax86_408.exe
-
Size
250KB
-
MD5
577a7463c63d02169a33ca2736f7ac98
-
SHA1
cb34c1b37698cfd3fc0382abaec40e463354b6c3
-
SHA256
d9316f608fefe966a073cc79381a63c27da6b0db00a70fd34b672ca429bde8ef
-
SHA512
a5deb168a322914db09a1a2c5eb20f33c2913e542a5a0e777c390c4b11034d03a62de59d91fd8fc9b379aa55041d51818ea327486e3452de4eae0da314ff2a57
-
SSDEEP
6144:L3j/Zua8BWOpto2j6p+MqVIAeAOOK6E3A:Tj/Zua8BWOg2j60IN8NE3
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-