MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3fb0587d38c59d7b15929a1566fafc764271cfe54f1e117e87f02617a112eafa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 3fb0587d38c59d7b15929a1566fafc764271cfe54f1e117e87f02617a112eafa
SHA3-384 hash: f76df88464e08f8fa45ced59e174401afa96dee78d414513fc8b563f3e82166ca4f1187c8a98af9e34736c662273a19a
SHA1 hash: edc78a82f4b3dfc26c69ea3bb978fdb4ffcb5bde
MD5 hash: a4380a3ba1b86daf74e879e834c9548f
humanhash: pluto-california-coffee-uncle
File name:3fb0587d38c59d7b15929a1566fafc764271cfe54f1e117e87f02617a112eafa.bin
Download: download sample
Signature CobaltStrike
File size:12'288 bytes
First seen:2020-09-10 08:54:44 UTC
Last seen:2020-09-10 09:44:17 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 192:oiv01FppYjko4p8KCbwtQHImBYC8+yECxD5ggNDIx8P/tq4zc+TKAEuj1Pr7S:ois1Z9o4plISmBYC8+yEidgATP/I83Pn
Threatray 53 similar samples on MalwareBazaar
TLSH 18420A3DCD68423FC2B7C23CC9DB8B07F9915917270DEE4A60D763965923283B99216E
Reporter JAMESWT_WT
Tags:154.92.16.126 CobaltStrike

Intelligence


File Origin
# of uploads :
2
# of downloads :
105
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Sending an HTTP GET request
Result
Threat name:
CobaltStrike
Detection:
malicious
Classification:
troj
Score:
88 / 100
Signature
Antivirus / Scanner detection for submitted sample
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Uses known network protocols on non-standard ports
Yara detected CobaltStrike
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Backdoor.Meterpreter
Status:
Malicious
First seen:
2019-11-29 17:42:21 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
31 of 48 (64.58%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  4/10
Tags:
n/a
Behaviour
Modifies data under HKEY_USERS
Suspicious use of AdjustPrivilegeToken
Drops file in Windows directory
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments