MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c786e4de11e64be8d4118cf8ba6b210e3396e3bb579f3afd4bf528c35bab4a6b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: c786e4de11e64be8d4118cf8ba6b210e3396e3bb579f3afd4bf528c35bab4a6b
SHA3-384 hash: 73fcfd2ce991c3e3ed61cb5507674ceab598f0de27eac09a7bcf19890954cf6ecfc5eb2dbb28797fc04f7a7dacc1e0d8
SHA1 hash: 92d32c824891ea2055fbdd6b66597d7f5c003e88
MD5 hash: ef013138a06171ddaed1334601640db4
humanhash: dakota-freddie-west-mars
File name:c786e4de11e64be8d4118cf8ba6b210e3396e3bb579f3afd4bf528c35bab4a6b
Download: download sample
Signature CobaltStrike
File size:1'751'448 bytes
First seen:2020-09-17 07:13:35 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e22ccfedd44aae254634de550bf86f4e (1 x CobaltStrike)
ssdeep 12288:bTmSpXrXEiYXEXKTPlGu+cKcgLy0TuT3Z5WXnXHX3XXXnXnXXXHHHXnXX33X3Xn4:XmSSiW8BcgluLH
Threatray 68 similar samples on MalwareBazaar
TLSH 2C8507B120190E1FF3DA583DADC2FD77399EA93851EBF5D1AA512637B0A893C4C78091
Reporter JAMESWT_WT
Tags:CobaltStrike Lets Start SP Z O O signed

Code Signing Certificate

Organisation:Lets Start SP Z O O
Issuer:Sectigo RSA Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:May 27 00:00:00 2020 GMT
Valid to:May 27 23:59:59 2021 GMT
Serial number: AFF762E907F0644E76ED8A7485FB12A1
MalwareBazaar Blocklist:This certificate is on the MalwareBazaar code signing certificate blocklist (CSCB)
Thumbprint Algorithm:SHA256
Thumbprint: 7B0C55AE9F8F5D82EDBC3741EA633AE272BBB2207DA8E88694E06D966D86BC63
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
100
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
DNS request
Sending a TCP request to an infection source
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
68 / 100
Signature
Antivirus / Scanner detection for submitted sample
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.CobaltStrike
Status:
Malicious
First seen:
2020-07-17 17:33:18 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
37 of 48 (77.08%)
Threat level:
  5/5
Result
Malware family:
cobaltstrike
Score:
  10/10
Tags:
trojan backdoor family:cobaltstrike
Behaviour
Cobaltstrike
Malware Config
C2 Extraction:
http://amlakist.com:443/jquery-3.3.1.min.js
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments