I found this interesting tweet from Malwar3Ninja and decided to take a look and analyze the Cobalt Strike PowerShell payload.
We can spot the for function:
Base64 block is encrypted with xor with a key of 35 and we decrypt it using CyberChef.
I have uploaded the file and now we can extract the encoded Base64 payload from the PowerShell.
Extracted Base64
1.5.157.229
we can also extract the shellcode
Shellcode first stage (Immunity Debugger):
https://www.virustotal.com/gui/file/dc236e4600cc76df3e2359a5e5f187a09e17ff83baff1bb7c75b77c025a59594/detection
Now let's format the code using Python
The executable file is connecting to 1.15.157[.]229:8080
Virus Total (Analysis) :
No comments:
Post a Comment