MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 06f5157afd7a7595fbe784a6e098a8286bf5f3cded51f4969b431066baa5c386. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 06f5157afd7a7595fbe784a6e098a8286bf5f3cded51f4969b431066baa5c386
SHA3-384 hash: 2b0235ad75129c7f15180b49a4d10073e3901e91461356d70202d411a8f50000c4d339368cb07fe6c5e1d97b30f981ff
SHA1 hash: 0f4f0b41846b400769e5c3ddab467279077c85a7
MD5 hash: cd5059bd1494e41766c93d077aa7f0f5
humanhash: xray-single-low-white
File name:06f5157afd7a7595fbe784a6e098a8286bf5f3cded51f4969b431066baa5c386
Download: download sample
Signature CobaltStrike
File size:13'824 bytes
First seen:2020-08-28 10:43:47 UTC
Last seen:2020-08-28 11:47:10 UTC
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 192:Z11X40cTY/4LoQZp9DrupendTHQpa7s+ivbXHQ6uCvtkV/OdU3:y9ThkQ/9HuAndT0a7stvzw6Dt8mdU
Threatray 4 similar samples on MalwareBazaar
TLSH 17525C3DCD68423BC2B7C23DC9CB8B03F991591B271DEE0A50D763A75923283B59216E
Reporter JAMESWT_WT
Tags:CobaltStrike

Intelligence


File Origin
# of uploads :
2
# of downloads :
83
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Creating a process with a hidden window
Creating a window
Launching the default Windows debugger (dwwin.exe)
Sending a UDP request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
64 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 279088 Sample: tDe7AdYwRY Startdate: 28/08/2020 Architecture: WINDOWS Score: 64 18 Antivirus / Scanner detection for submitted sample 2->18 20 Multi AV Scanner detection for submitted file 2->20 22 Machine Learning detection for sample 2->22 6 tDe7AdYwRY.exe 2 2->6         started        process3 signatures4 24 Allocates memory in foreign processes 6->24 9 WerFault.exe 21 9 6->9         started        12 conhost.exe 6->12         started        14 notepad.exe 6->14         started        process5 file6 16 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 9->16 dropped
Threat name:
ByteCode-MSIL.Hacktool.Aviator
Status:
Malicious
First seen:
2020-08-22 16:44:01 UTC
File Type:
PE+ (.Net Exe)
Extracted files:
1
AV detection:
21 of 29 (72.41%)
Threat level:
  1/5
Result
Malware family:
metasploit
Score:
  10/10
Tags:
trojan backdoor family:metasploit
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
MetaSploit
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments