MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 34d38e1cf8761561180c63079d63c277b92959359278be8d020391524dece203. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 34d38e1cf8761561180c63079d63c277b92959359278be8d020391524dece203
SHA3-384 hash: 8f27fa3febde9ac20062c5c0d37359e8dd6f276060a4889439cd4cf0722e8a942cfd56cf294fd66fb52bf700624465a0
SHA1 hash: a4c2297bb20a5411b0ecff482c4c6a58ca70ac33
MD5 hash: 844746436bab73fb993a4714ccba6ef2
humanhash: mobile-eight-charlie-mango
File name:34d38e1cf8761561180c63079d63c277b92959359278be8d020391524dece203
Download: download sample
Signature CobaltStrike
File size:1'835'320 bytes
First seen:2020-09-05 05:59:04 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 3625ffc5053fe37581b07f0331444eb9 (3 x CobaltStrike)
ssdeep 6144:zdZBh8yGtiyB4RHrU/f0IFzzyejTxCoTgtCR8FYZ9gih+OjloF9:z7dWiyB4lgF/yejTx6BYZ9gyfOn
TLSH 5085058014EDDE77BDC3B33AF1D9EE167910206810EFD0402DFCA0B97DD729A195A99A
Reporter JAMESWT_WT
Tags:CobaltStrike

Code Signing Certificate

Organisation:Programavimo paslaugos
Issuer:Sectigo RSA Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:May 14 00:00:00 2020 GMT
Valid to:May 14 23:59:59 2021 GMT
Serial number: 29128A56E7B3BFB230742591AC8B4718
Intelligence: 3 malware samples on MalwareBazaar are signed with this code signing certificate
MalwareBazaar Blocklist:This certificate is on the MalwareBazaar code signing certificate blocklist (CSCB)
Thumbprint Algorithm:SHA256
Thumbprint: F9FCC798E1FCCEE123034FE9DA9A28283DE48BA7AE20F0C55CE0D36AE4625133
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
100
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Sending a UDP request
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2020-09-04 19:24:30 UTC
File Type:
PE (Exe)
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
cobaltstrike
Score:
  10/10
Tags:
trojan backdoor family:cobaltstrike
Behaviour
Cobaltstrike
Malware Config
C2 Extraction:
http://adsmarketart.com:443/jquery-3.3.1.min.js
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments