MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 25c30b1001d3799a98ca05248300a94ef66ee506f7d38531098b412be5820c69. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 8


Intelligence 8 IOCs YARA 6 File information Comments

SHA256 hash: 25c30b1001d3799a98ca05248300a94ef66ee506f7d38531098b412be5820c69
SHA3-384 hash: 5fd02a3b28c2e2e0c7b75de10429081e2439ceee647d6c642891f247711604b21876a9dbab538db4c6520d92390e1de4
SHA1 hash: 531f22cf3edd9e0fe5a95ce358f0db5543496cc1
MD5 hash: 87bcd8a6f313f340d3106e4e93f32007
humanhash: social-blossom-venus-vegan
File name:25c30b1001d3799a98ca05248300a94ef66ee506f7d38531098b412be5820c69
Download: download sample
Signature CobaltStrike
File size:222'208 bytes
First seen:2020-11-14 18:28:45 UTC
Last seen:2020-11-14 20:40:57 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 829da329ce140d873b4a8bde2cbfaa7e (259 x CobaltStrike)
ssdeep 6144:h2mROrQG54BgQsXFQlOR2QntvbM1y05shnXl35rDOpVp:Azr0JOTtv+y8sN1BOp
Threatray 192 similar samples on MalwareBazaar
TLSH 4624CEF3BCF86A1FE0430F35EBBA1D74DD2A1E7B0A524992CE6895841D923EC795C109
Reporter seifreed
Tags:CobaltStrike

Intelligence


File Origin
# of uploads :
2
# of downloads :
98
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
DNS request
Connection attempt
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
CobaltStrike
Detection:
malicious
Classification:
troj
Score:
84 / 100
Signature
Antivirus / Scanner detection for submitted sample
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected CobaltStrike
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.CobaltStrike
Status:
Malicious
First seen:
2020-11-14 18:31:38 UTC
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Unpacked files
SH256 hash:
25c30b1001d3799a98ca05248300a94ef66ee506f7d38531098b412be5820c69
MD5 hash:
87bcd8a6f313f340d3106e4e93f32007
SHA1 hash:
531f22cf3edd9e0fe5a95ce358f0db5543496cc1
SH256 hash:
c41504c08d0612c906f3e32124e0d6eebf5e566a5d430e309c6d399f5f9f1a14
MD5 hash:
e1f19b6c171e00eadcdc25664e785da9
SHA1 hash:
902394b2c7bf8e3d1e227dea62112be45677e94b
SH256 hash:
8e9da48c62a8fd86638dec41640e585aa29253b5f3643812ef5868eb84191887
MD5 hash:
580b5e829e922467a48d871d0c0cd9f8
SHA1 hash:
abe078c7f3ab183d9f73eb426b6a5ff5999d0fd1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:APT_DarkHydrus_Jul18_5
Author:Florian Roth
Description:Detects strings found in malware samples in APT report in DarkHydrus
Reference:https://researchcenter.paloaltonetworks.com/2018/07/unit42-new-threat-actor-group-darkhydrus-targets-middle-east-government/
Rule name:CobaltStrike_Unmodifed_Beacon
Author:yara@s3c.za.net
Description:Detects unmodified CobaltStrike beacon DLL
Rule name:crime_win32_csbeacon_1
Author:@VK_Intel
Description:Detects Cobalt Strike loader
Reference:https://twitter.com/VK_Intel/status/1239632822358474753
Rule name:HKTL_Meterpreter_inMemory
Author:netbiosX, Florian Roth
Description:Detects Meterpreter in-memory
Reference:https://www.reddit.com/r/purpleteamsec/comments/hjux11/meterpreter_memory_indicators_detection_tooling/
Rule name:ReflectiveLoader
Description:Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended
Reference:Internal Research
Rule name:WiltedTulip_ReflectiveLoader
Author:Florian Roth
Description:Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip
Reference:http://www.clearskysec.com/tulip

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments