MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3cd9b8f675d4718c4d73a9b1656836790a058b8ba46c1e0f254d46775ab06556. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 8


Intelligence 8 IOCs YARA 11 File information Comments

SHA256 hash: 3cd9b8f675d4718c4d73a9b1656836790a058b8ba46c1e0f254d46775ab06556
SHA3-384 hash: 6014037442efd9103b52838a4465ed13718f9b2287dd8313a7a8e05d57067dfacea18bf592b7aff94d35a7dda8e0374d
SHA1 hash: ea97137110cf89f6e04317f6f420d2a32675642a
MD5 hash: 5ec6c5ab7d588bb335f992b9061ad93d
humanhash: winter-indigo-summer-magnesium
File name:3cd9b8f675d4718c4d73a9b1656836790a058b8ba46c1e0f254d46775ab06556
Download: download sample
Signature CobaltStrike
File size:825'312 bytes
First seen:2020-11-23 08:20:56 UTC
Last seen:2020-11-23 09:51:41 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash a36635f9a7dec9626b2f2276da313f5c (1 x CobaltStrike)
ssdeep 12288:MlEtuMp9iGhgWHaKe6iLqDTqBPswc1SJKg3F82aT/2AAA7Y0kopc+dmPJfy:MlEsMqGuWRDW1w18hZaT/1Y03K1PJfy
Threatray 207 similar samples on MalwareBazaar
TLSH 7805CFDCE7F8726BD47A00704DEC72E3385E7C42D82219AB56AC769A4431CDD6E603A7
Reporter JAMESWT_WT
Tags:CobaltStrike Rada SP Z o o signed

Code Signing Certificate

Organisation:Rada SP Z o o
Issuer:Sectigo RSA Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:Nov 12 00:00:00 2020 GMT
Valid to:Nov 12 23:59:59 2021 GMT
Serial number: 9272607CFC982B782A5D36C4B78F5E7B
MalwareBazaar Blocklist:This certificate is on the MalwareBazaar code signing certificate blocklist (CSCB)
Thumbprint Algorithm:SHA256
Thumbprint: 2514C615FE54D511555BC5B57909874E48A438918A54CEA4A0B3FBC401AFA127
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
181
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
60 / 100
Signature
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Behaviour
Behavior Graph:
Threat name:
Win32.Ransomware.WannaCry
Status:
Malicious
First seen:
2020-11-22 02:10:32 UTC
File Type:
PE (Exe)
Extracted files:
7
AV detection:
23 of 28 (82.14%)
Threat level:
  5/5
Result
Malware family:
cobaltstrike
Score:
  10/10
Tags:
family:cobaltstrike backdoor trojan
Behaviour
Cobaltstrike
Unpacked files
SH256 hash:
3cd9b8f675d4718c4d73a9b1656836790a058b8ba46c1e0f254d46775ab06556
MD5 hash:
5ec6c5ab7d588bb335f992b9061ad93d
SHA1 hash:
ea97137110cf89f6e04317f6f420d2a32675642a
SH256 hash:
7f72d01f305b8680c7cb791ecbc980202fe06f8259601091998a87a0d6b8d150
MD5 hash:
69166ed556f72f78da497b5df5670b96
SHA1 hash:
593c585e09ee918fe14a8ca0b778c85e1b9b0dfc
SH256 hash:
3949511258463ae2082f77055fe30816d9352e550b0e7a9810b27f58249a3c1c
MD5 hash:
d4ecb5b86db32cdf57aa211b43d2231b
SHA1 hash:
925e7ed229c29360f5c3d4fdaf3d59c9982ca000
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Beacon_K5om
Author:Florian Roth
Description:Detects Meterpreter Beacon - file K5om.dll
Reference:https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html
Rule name:CobaltStrikeBeacon
Author:enzo
Description:Cobalt Strike Beacon Payload
Rule name:CobaltStrike_Unmodifed_Beacon
Author:yara@s3c.za.net
Description:Detects unmodified CobaltStrike beacon DLL
Rule name:crime_win32_csbeacon_1
Author:@VK_Intel
Description:Detects Cobalt Strike loader
Reference:https://twitter.com/VK_Intel/status/1239632822358474753
Rule name:HKTL_Meterpreter_inMemory
Author:netbiosX, Florian Roth
Description:Detects Meterpreter in-memory
Reference:https://www.reddit.com/r/purpleteamsec/comments/hjux11/meterpreter_memory_indicators_detection_tooling/
Rule name:Leviathan_CobaltStrike_Sample_1
Author:Florian Roth
Description:Detects Cobalt Strike sample from Leviathan report
Reference:https://goo.gl/MZ7dRg
Rule name:Malware_QA_vqgk
Author:Florian Roth
Description:VT Research QA uploaded malware - file vqgk.dll
Reference:VT Research QA
Rule name:PowerShell_Susp_Parameter_Combo
Author:Florian Roth
Description:Detects PowerShell invocation with suspicious parameters
Reference:https://goo.gl/uAic1X
Rule name:ReflectiveLoader
Description:Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended
Reference:Internal Research
Rule name:SUSP_XORed_Mozilla
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research
Rule name:WiltedTulip_ReflectiveLoader
Author:Florian Roth
Description:Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip
Reference:http://www.clearskysec.com/tulip

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments