MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 70eae6d411554b0587f9bc3e7e7cc753e81b8086310dc5fa8181c44632fe1ada. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 70eae6d411554b0587f9bc3e7e7cc753e81b8086310dc5fa8181c44632fe1ada
SHA3-384 hash: 6583f48699fae8f208b4b7b627abf8025d481011fea9e3f24111fd65ee170a42ad1b3b24494a38f8d70f1a76e70f762f
SHA1 hash: 913fca01c50a2be893f26de347cef21f185de49c
MD5 hash: 929382d455868a6037c3a4ff93e81314
humanhash: ohio-jig-winner-missouri
File name:qwr.bin
Download: download sample
Signature CobaltStrike
File size:1'379'752 bytes
First seen:2020-07-29 11:41:28 UTC
Last seen:2020-07-29 13:01:14 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f0d42366f30ff976d3d577f50e98d196 (1 x CobaltStrike)
ssdeep 6144:+LJeRq3s+SoggtUQg2tHlQNCL0TJd5FjZ0nriipVor1aYtE6gR9KTlkyrcijO:4n3s+3tvdtFCCYV7FjqP81aoblk/ijO
Threatray 72 similar samples on MalwareBazaar
TLSH DC55180B918B8F2CC6ED51B6F8EAE32E5566D04E1D0B2D6C63ACD1B1B4D35187C80BD9
Reporter JAMESWT_WT
Tags:CobaltStrike

Code Signing Certificate

Organisation:F.A.T. SARL
Issuer:Sectigo RSA Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:May 27 00:00:00 2020 GMT
Valid to:May 27 23:59:59 2021 GMT
Serial number: B649A966410F62999C939384AF553919
MalwareBazaar Blocklist:This certificate is on the MalwareBazaar code signing certificate blocklist (CSCB)
Thumbprint Algorithm:SHA256
Thumbprint: A0C6CD25E1990C0D03B6EC1AD5A140F2C8014A8C2F1F4F227EE2597DF91A8B6C
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
86
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a custom TCP request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
60 / 100
Signature
Detected unpacking (changes PE section rights)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.CobaltStrike
Status:
Malicious
First seen:
2020-07-29 08:19:57 UTC
File Type:
PE (Exe)
AV detection:
34 of 48 (70.83%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Modifies system certificate store
Malware Config
C2 Extraction:
http://signup-now.com:443/jquery-3.3.1.min.js
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments