MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 32b8ffac3250444904e6af3fca1f6408e684f11ad59e6c46887cf44f5de19e6b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 32b8ffac3250444904e6af3fca1f6408e684f11ad59e6c46887cf44f5de19e6b
SHA3-384 hash: aaaa500e32c6f78f330a8b31aec5a40832000f29a250ecd55f15f3acdebb5a7b0c4b54aa616a48ab636a2613b47373e4
SHA1 hash: b6e3b34f445faac075424809cca0211d657aac1b
MD5 hash: cda53f54f03c7cbb67652c9d638aa6da
humanhash: queen-snake-uranus-apart
File name:32b8ffac3250444904e6af3fca1f6408e684f11ad59e6c46887cf44f5de19e6b
Download: download sample
Signature CobaltStrike
File size:1'412'096 bytes
First seen:2020-08-31 13:25:29 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 167344a4df394fbba605fc972e41437a (4 x CobaltStrike, 1 x GoCryptoLocker, 1 x Sodinokibi)
ssdeep 24576:jFtGDEEpmgjotoEW3kfNSAK6oLUb75zMzSjNtJHilf5FZ/x:jKDEEpmgjotE3aSAKJsueRfHof5h
Threatray 23 similar samples on MalwareBazaar
TLSH 65656B077CE51CBED97AF23149A292A03733B86903327BD31E49657A1676ED02E3D364
Reporter JAMESWT_WT
Tags:120.79.218.54 CobaltStrike

Intelligence


File Origin
# of uploads :
1
# of downloads :
83
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Sending an HTTP GET request
Result
Threat name:
CobaltStrike
Detection:
malicious
Classification:
troj
Score:
76 / 100
Signature
Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Uses known network protocols on non-standard ports
Yara detected CobaltStrike
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.Rozena
Status:
Malicious
First seen:
2020-08-24 13:37:30 UTC
File Type:
PE+ (Exe)
AV detection:
17 of 25 (68.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  4/10
Tags:
n/a
Behaviour
Modifies data under HKEY_USERS
Suspicious use of AdjustPrivilegeToken
Drops file in Windows directory
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments