General
-
Target
8b9d9b7d051f9e6805c20c82c031ace3ae434776ca88df310f9cea3e9a2c83ac
-
Size
259KB
-
Sample
240629-memsdsvgre
-
MD5
8adf03cedd9d549c9aee3919754ab9b3
-
SHA1
ff7045735396dffeafdfc7558bf45382004be673
-
SHA256
8b9d9b7d051f9e6805c20c82c031ace3ae434776ca88df310f9cea3e9a2c83ac
-
SHA512
498239924dcb9e416d6004dc5431d71f1bacdb719fbc261630f33ee19673fb6d915fc28ecec48430433fb1e06713549feea2a5cfe493190d968ca890a44958d6
-
SSDEEP
6144:fJqKG5d1IpMyibgkTZI6jHID90aNBXgvH/:f6d6tevox9BXgX
Behavioral task
behavioral1
Sample
8b9d9b7d051f9e6805c20c82c031ace3ae434776ca88df310f9cea3e9a2c83ac.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
8b9d9b7d051f9e6805c20c82c031ace3ae434776ca88df310f9cea3e9a2c83ac.dll
Resource
win10v2004-20240508-en
Malware Config
Extracted
cobaltstrike
100000000
http://venus.024jiacheng.com:2052/www/handle/get
http://129.150.43.163:2052/www/handle/get
-
access_type
512
-
beacon_type
2048
-
host
venus.024jiacheng.com,/www/handle/get,129.150.43.163,/www/handle/get
-
http_header1
AAAABwAAAAAAAAANAAAAAgAAAApTRVNTSU9OSUQ9AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAABwAAAAAAAAAPAAAACwAAAAIAAAAHcHVibGljPQAAAAEAAAACJSUAAAAGAAAABFVzZXIAAAAHAAAAAQAAAA8AAAANAAAAAgAAAAdwdWJsaWM9AAAAAQAAAAIlJQAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
jitter
1792
-
polling_time
3000
-
port_number
2052
-
sc_process32
c:\windows\syswow64\rundll32.exe
-
sc_process64
c:\windows\system32\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCqzEJfhNRDTUWc4OFw6QgWMCgtZpCzf+4+RQGYwL9gNHEC7Oh+6fCB3hnfVWpvxm96OVnB0eWJt6P1aNkZxVZ+u6PuqrBRm+Ad5gbjYgujotq7rM44FsmQaZAp8fORER8oRJjuMN1AxEzkj0VjMXZ8LwkT+0lyLqjjmBsdJBcCWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
2.85220864e+08
-
unknown2
AAAABAAAAAEAAAACAAAAAgAAAAcAAAAIAAAADwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/post
-
user_agent
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.3; .NET4.0C; Tablet PC 2.0; .NET4.0E)
-
watermark
100000000
Targets
-
-
Target
8b9d9b7d051f9e6805c20c82c031ace3ae434776ca88df310f9cea3e9a2c83ac
-
Size
259KB
-
MD5
8adf03cedd9d549c9aee3919754ab9b3
-
SHA1
ff7045735396dffeafdfc7558bf45382004be673
-
SHA256
8b9d9b7d051f9e6805c20c82c031ace3ae434776ca88df310f9cea3e9a2c83ac
-
SHA512
498239924dcb9e416d6004dc5431d71f1bacdb719fbc261630f33ee19673fb6d915fc28ecec48430433fb1e06713549feea2a5cfe493190d968ca890a44958d6
-
SSDEEP
6144:fJqKG5d1IpMyibgkTZI6jHID90aNBXgvH/:f6d6tevox9BXgX
Score1/10 -