General

  • Target

    07d1472e0e4a6dde466c45c43f478784c76a4406f3db66995b3b7b4f4b652ec5

  • Size

    105KB

  • Sample

    240630-w35sjssbqh

  • MD5

    a10ae788f0cb230b6a271a03278692a0

  • SHA1

    f0538ca316da2b1555e438e7d0f041668060e411

  • SHA256

    07d1472e0e4a6dde466c45c43f478784c76a4406f3db66995b3b7b4f4b652ec5

  • SHA512

    b42fe9ad8f1c212041c14966d49ee976dcb70b870631fb712463d106c40e2f6aa8c456d200a1b219a4c4f6749469a3bb4a9fa04d6d9a7b760ebd6567fad29c15

  • SSDEEP

    1536:be1+PsRuRfDOyMsqGvq3ogaI/n01l6zUhOq2qDYjVCCizbgECnpE9+eV1gJ:bpURuRfDO+qKq3oga1qQI8WVC9lF9X6

Malware Config

Extracted

Family

cobaltstrike

C2

http://154.211.98.3:1368/6Djy

Attributes
  • user_agent

    User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; WOW64; Trident/6.0; MALNJS)

Targets

    • Target

      07d1472e0e4a6dde466c45c43f478784c76a4406f3db66995b3b7b4f4b652ec5

    • Size

      105KB

    • MD5

      a10ae788f0cb230b6a271a03278692a0

    • SHA1

      f0538ca316da2b1555e438e7d0f041668060e411

    • SHA256

      07d1472e0e4a6dde466c45c43f478784c76a4406f3db66995b3b7b4f4b652ec5

    • SHA512

      b42fe9ad8f1c212041c14966d49ee976dcb70b870631fb712463d106c40e2f6aa8c456d200a1b219a4c4f6749469a3bb4a9fa04d6d9a7b760ebd6567fad29c15

    • SSDEEP

      1536:be1+PsRuRfDOyMsqGvq3ogaI/n01l6zUhOq2qDYjVCCizbgECnpE9+eV1gJ:bpURuRfDO+qKq3oga1qQI8WVC9lF9X6

    • Cobaltstrike

      Detected malicious payload which is part of Cobaltstrike.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks