General
-
Target
ccbd23833c25ef43bedfd8852d4faf0161a4d253cbc4c169a540ef6354929626
-
Size
312KB
-
Sample
250407-tz7rmav1c1
-
MD5
b1ccc2ec93ab7744445d212fb74819ff
-
SHA1
723d0e2c1175c74b8632b5aa8d294e1ac7529e64
-
SHA256
ccbd23833c25ef43bedfd8852d4faf0161a4d253cbc4c169a540ef6354929626
-
SHA512
445e713f1232fe3b67f82f09689b8068ddead86cf9ffb1d7a899a0005ac4eca9ee5bee7064986cdf2909e021d4e40da0e3a4e0176477880ef647719f799f0c9a
-
SSDEEP
6144:uJqVG5d1IpMyibgkTZI6jHID90aVBX4H/:u3d6tevoxlBX+
Behavioral task
behavioral1
Sample
ccbd23833c25ef43bedfd8852d4faf0161a4d253cbc4c169a540ef6354929626.dll
Resource
win10v2004-20250314-en
Malware Config
Extracted
cobaltstrike
100000
http://192.168.138.137:100/__utm.gif
-
access_type
512
-
host
192.168.138.137,/__utm.gif
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
polling_time
60000
-
port_number
100
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCZhtFsPp0BFIbpHBfDeEBgqalPmpqO3i5bxPD9bGMv7/JbvaUXdb7M4mODSwcsMoUQJxkWzdCcEl8cHuOIlbiH+yALjZU441S/D2aVUKzIHamg6gok51JzGbwEn+nGd/iHX9rW7AWnWk9HGsttBJBjIjNr+/iAmjqW5gj89O2TxwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; MANM)
-
watermark
100000
Targets
-
-
Target
ccbd23833c25ef43bedfd8852d4faf0161a4d253cbc4c169a540ef6354929626
-
Size
312KB
-
MD5
b1ccc2ec93ab7744445d212fb74819ff
-
SHA1
723d0e2c1175c74b8632b5aa8d294e1ac7529e64
-
SHA256
ccbd23833c25ef43bedfd8852d4faf0161a4d253cbc4c169a540ef6354929626
-
SHA512
445e713f1232fe3b67f82f09689b8068ddead86cf9ffb1d7a899a0005ac4eca9ee5bee7064986cdf2909e021d4e40da0e3a4e0176477880ef647719f799f0c9a
-
SSDEEP
6144:uJqVG5d1IpMyibgkTZI6jHID90aVBX4H/:u3d6tevoxlBX+
Score1/10 -