General
-
Target
d5acf7ab5910bc386d6d3a5a747f79da0da7598e6476ae0284e57fbeaed06438.zip
-
Size
144KB
-
Sample
250411-gz18ma1qy4
-
MD5
7a123deee546f7f008c8c74ffe072e77
-
SHA1
690cd186ec0894c05cfd0ac699db4435b4e59d67
-
SHA256
2da41565fd4ad6ac24722da15d0020d21a91ce6a14a8c1fa8d87b550209278b3
-
SHA512
6d0435780a180254c7a9b0b6739e18b90c4ef412c8912c72434956e23636aa6bb15e18a6a47975cf6782704686e26ad85fe5eb668b09d4ebf9e889e4e7082820
-
SSDEEP
3072:yOh5nuLXFTp19A2dsj554OcrQ9WXq0VrUTJgsEbPA9kVzZ2dCrNBSAC:yOh5AXFT2jH4OuQYXFrU9gsOOGZ2gy
Behavioral task
behavioral1
Sample
d5acf7ab5910bc386d6d3a5a747f79da0da7598e6476ae0284e57fbeaed06438.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
cobaltstrike
100000
http://192.168.138.137:100/__utm.gif
-
access_type
512
-
host
192.168.138.137,/__utm.gif
-
http_header1
AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
polling_time
60000
-
port_number
100
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCZhtFsPp0BFIbpHBfDeEBgqalPmpqO3i5bxPD9bGMv7/JbvaUXdb7M4mODSwcsMoUQJxkWzdCcEl8cHuOIlbiH+yALjZU441S/D2aVUKzIHamg6gok51JzGbwEn+nGd/iHX9rW7AWnWk9HGsttBJBjIjNr+/iAmjqW5gj89O2TxwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/submit.php
-
user_agent
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; MANM)
-
watermark
100000
Targets
-
-
Target
d5acf7ab5910bc386d6d3a5a747f79da0da7598e6476ae0284e57fbeaed06438
-
Size
383KB
-
MD5
e5927af4e79b1122df8c3711ed4bd426
-
SHA1
7694c154be56cb9d095bd38b1d29ce93cd55f430
-
SHA256
d5acf7ab5910bc386d6d3a5a747f79da0da7598e6476ae0284e57fbeaed06438
-
SHA512
73900a52cc60d600c340bd6511e79d20897b172ceed9d8c6e69aab675e033306ccfef99dfed3fa32e9bb497cbac67dce9ebe4fca0e35ed5eb8c68ae72350c117
-
SSDEEP
6144:PkwBPvtJqVG5d1IpMyibgkTZI6jHID90aVBX4H/H:PdBPvt3d6tevoxlBX+
Score10/10-
Cobaltstrike family
-