MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 558ec2b4c735574edc8757f11592735eb27aa61693885b5aa7299c7950faf1c0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: 558ec2b4c735574edc8757f11592735eb27aa61693885b5aa7299c7950faf1c0
SHA3-384 hash: 5222055b590071750c3c88f10a9c809defb24c4aece44829b2f1ffac9adbc4f7c6f1572ac09c9e0f8c7858d98273a146
SHA1 hash: b200bffc9bbb2f158924665d9d51043bd69d32d5
MD5 hash: 5f005808a9488024f9a4aa3dbe8c31fa
humanhash: fish-grey-illinois-virginia
File name:558ec2b4c735574edc8757f11592735eb27aa61693885b5aa7299c7950faf1c0
Download: download sample
Signature CobaltStrike
File size:222'208 bytes
First seen:2020-11-12 14:17:32 UTC
Last seen:2024-07-24 14:30:19 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 829da329ce140d873b4a8bde2cbfaa7e (259 x CobaltStrike)
ssdeep 6144:TJ+V9mWGnY0vCEFF5DUyT8xnSwxDk8wyvsxGeHGD:TUyRvrFFN18x7Dk8w8s
Threatray 173 similar samples on MalwareBazaar
TLSH F524DFF08D277929F8C36171EEAC7EF61C8AD1970C0F980F869C9E1F85177628951C5A
Reporter seifreed
Tags:CobaltStrike

Intelligence


File Origin
# of uploads :
2
# of downloads :
62
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Connection attempt
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.CobaltStrike
Status:
Malicious
First seen:
2020-11-12 14:21:13 UTC
AV detection:
27 of 29 (93.10%)
Threat level:
  5/5
Result
Malware family:
cobaltstrike
Score:
  10/10
Tags:
family:cobaltstrike backdoor trojan
Behaviour
Cobaltstrike
Malware Config
C2 Extraction:
http://universalec.com.zclngty.club:443/owa/
Unpacked files
SH256 hash:
558ec2b4c735574edc8757f11592735eb27aa61693885b5aa7299c7950faf1c0
MD5 hash:
5f005808a9488024f9a4aa3dbe8c31fa
SHA1 hash:
b200bffc9bbb2f158924665d9d51043bd69d32d5
SH256 hash:
153041bfa45bfdfcfc6e7ae7f4132de3d6690ea04ba5f670c6c1320fc236d0d2
MD5 hash:
a99ab12aa661d05367d4db28d07768a0
SHA1 hash:
1994dfb1b46e32182e226d209d678920babc3d08
SH256 hash:
e895eca66c12e2f41e9b59c6c860def71ac9cafb6f0cee277eec29783a64e4d7
MD5 hash:
da9717c654dbf381d7077ca31bfd1ff3
SHA1 hash:
80c08030fe5bbc83d361eb9f75f8bb6659ff5913
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:APT_DarkHydrus_Jul18_5
Author:Florian Roth
Description:Detects strings found in malware samples in APT report in DarkHydrus
Reference:https://researchcenter.paloaltonetworks.com/2018/07/unit42-new-threat-actor-group-darkhydrus-targets-middle-east-government/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments