MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 83653a93fc7d8cba1b6d9bcc7650a10b1b7f0c10ab2b1c112f9d1b7d37333051. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 83653a93fc7d8cba1b6d9bcc7650a10b1b7f0c10ab2b1c112f9d1b7d37333051
SHA3-384 hash: 1183adb2f84baacbf6b11fe4e81f80932494f5f5cdcb02e0d72a525d993f41d3e78477e952ff9e60e73a1687d6cc9fdb
SHA1 hash: 8dfbe8fade096e83d2b43dc902cfdea491737ba2
MD5 hash: 5dfe5aee3f22321fe7efbb310a79a235
humanhash: wisconsin-pasta-william-pluto
File name:83653a93fc7d8cba1b6d9bcc7650a10b1b7f0c10ab2b1c112f9d1b7d37333051
Download: download sample
Signature CobaltStrike
File size:288'256 bytes
First seen:2021-10-29 04:32:51 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 17b461a082950fc6332228572138b80c (121 x CobaltStrike, 2 x Cobalt Strike)
ssdeep 6144:6CAZKYdFL8YrBZp4U4RriT4RxcqwjHzr5vkx1OQ:OZFD/NuFiTkx9wjHzr5BQ
Threatray 1'459 similar samples on MalwareBazaar
TLSH T16A54AE898A116FADF5B44C3B460462F0E53DA459D9CFDD91EB8CC22BA4BFACE350405E
Reporter JAMESWT_WT
Tags:CobaltStrike exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
171
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Connection attempt
Sending a custom TCP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Cobalt Strike
Verdict:
Malicious
Result
Threat name:
CobaltStrike
Detection:
malicious
Classification:
troj
Score:
92 / 100
Signature
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: CobaltStrike Named Pipe
Yara detected CobaltStrike
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.CobaltStrike
Status:
Malicious
First seen:
2021-10-28 11:07:17 UTC
AV detection:
23 of 28 (82.14%)
Threat level:
  5/5
Result
Malware family:
cobaltstrike
Score:
  10/10
Tags:
family:cobaltstrike botnet:426352781 backdoor trojan
Behaviour
Cobaltstrike
Malware Config
C2 Extraction:
http://updata.microsoft-api.workers.dev:443/be.css
Unpacked files
SH256 hash:
83653a93fc7d8cba1b6d9bcc7650a10b1b7f0c10ab2b1c112f9d1b7d37333051
MD5 hash:
5dfe5aee3f22321fe7efbb310a79a235
SHA1 hash:
8dfbe8fade096e83d2b43dc902cfdea491737ba2
Malware family:
Cobalt Strike
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments