General

  • Target

    759cf1794da1fc33d5d188d5ec9d0ea87450bda629b043f853d2a71c87a82d13

  • Size

    257KB

  • Sample

    240627-rtcm7avglc

  • MD5

    0c1f63b47e3d2ab51b25abb7009d183d

  • SHA1

    a8e4c67a0f3a6769f8b1c4f6ec45d5f587f0079e

  • SHA256

    759cf1794da1fc33d5d188d5ec9d0ea87450bda629b043f853d2a71c87a82d13

  • SHA512

    00529cc10e59d8b5497d251d3ac96bbd7f2906e060c002b3093c8978bafb4f65d04bc20794b035d10be29c8d476c1a66b638eaf2b2c69998e150b15bb70f0c1b

  • SSDEEP

    3072:ksYckn3Xzq4IDwSK2Mbn/gprBJwJNJsCwQTIfXouPruOOTR29BQYJerCoto:ksYwjwIGIprBJweGTIDjhOTRAQ8qo

Score
10/10

Malware Config

Extracted

Family

cobaltstrike

Botnet

100000000

C2

http://121.36.87.86:8088/pixel

Attributes
  • access_type

    512

  • host

    121.36.87.86,/pixel

  • http_header1

    AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_header2

    AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_method1

    GET

  • http_method2

    POST

  • polling_time

    60000

  • port_number

    8088

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCC4AM3jIYIVku12vK4rRBrEqWx4iEzmSmczddus2u487oiraVzK+xDMF3qqqfxVfcq8bQUbNaR5qhoiDteQZYbCFvVN3BkSwZ5Nl60l5EfLxOfKWKr59IYuRe0Q+BRomEXvsCQH+xc5svr1mZ5x1rMJ7FQwtNLYgFh6JJR/RiSRwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /submit.php

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.1 Safari/534.50

  • watermark

    100000000

Targets

    • Target

      759cf1794da1fc33d5d188d5ec9d0ea87450bda629b043f853d2a71c87a82d13

    • Size

      257KB

    • MD5

      0c1f63b47e3d2ab51b25abb7009d183d

    • SHA1

      a8e4c67a0f3a6769f8b1c4f6ec45d5f587f0079e

    • SHA256

      759cf1794da1fc33d5d188d5ec9d0ea87450bda629b043f853d2a71c87a82d13

    • SHA512

      00529cc10e59d8b5497d251d3ac96bbd7f2906e060c002b3093c8978bafb4f65d04bc20794b035d10be29c8d476c1a66b638eaf2b2c69998e150b15bb70f0c1b

    • SSDEEP

      3072:ksYckn3Xzq4IDwSK2Mbn/gprBJwJNJsCwQTIfXouPruOOTR29BQYJerCoto:ksYwjwIGIprBJweGTIDjhOTRAQ8qo

    Score
    1/10

MITRE ATT&CK Matrix

Tasks