General

  • Target

    b92af5397f63a06d0738d2c933ecb88fe63994d4c1caba872162d4d59118344c.zip

  • Size

    111KB

  • MD5

    3fa86527c92833ff34744f0872dc6b15

  • SHA1

    d080d1606e28c5140a1ef3de4185ef71e9f902e6

  • SHA256

    4124010aad2409ce3efc287d8a1bb6a058f667d8f17d08fde196dcbab5b4ab18

  • SHA512

    3e5d884fdb1a9035c441f2d3a67aaafad9e34e44ea434d76dd06cf57cd481a5779c2b5753741af62bbe0294a5862bf9e0434e5cc018bd3f9a9d2eefaa6b02ecc

  • SSDEEP

    3072:e6+bS0aoT+eTLwNE/LQX3wi8dHeU838PMAh7:gbS0tTmEzUcHePqMq

Malware Config

Extracted

Family

cobaltstrike

Botnet

1234567890

Attributes
  • beacon_type

    4096

  • http_header1

    AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_header2

    AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • polling_time

    10000

  • port_number

    4444

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCDEYKMjO6xN+2HAk7G4h5dpBoS8CIXLwNA9riINLtyESnqWT0PCwAVh83fEjkyLQZbRkY37geEf7Rw345fKQXOLZkT5u78GU9kPw2xpQ6H0crxednegjaWeGjTSAI+nwjarnWHNY1Xqb+xQlWeTLNMyLKCXJ/z0sfwKr5hwPGV0QIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • watermark

    1234567890

Signatures

  • Cobaltstrike family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • b92af5397f63a06d0738d2c933ecb88fe63994d4c1caba872162d4d59118344c.zip
    .zip

    Password: infected

  • b92af5397f63a06d0738d2c933ecb88fe63994d4c1caba872162d4d59118344c
    .dll windows:5 windows x86 arch:x86

    Password: infected

    e1a4d247b17efc22a4a7b36cfb5221ae


    Headers

    Imports

    Exports

    Sections