MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f4ca63aeb4e3246c5d923942497d650bc3920c9fbc78a330ecf9d7db67e0cb8f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: f4ca63aeb4e3246c5d923942497d650bc3920c9fbc78a330ecf9d7db67e0cb8f
SHA3-384 hash: b90de1ba25ab6425983e89b1f69cf4b639153115019112eac7c0bca0f8aace6ce5ef316c36219856b8b4babceb728534
SHA1 hash: 3f1b5a1a9462aaacccc236ca0d939fb1e99031f2
MD5 hash: 19cbc0f0a9b33c122f2ff1291f6e678a
humanhash: vermont-video-muppet-ten
File name:f4ca63aeb4e3246c5d923942497d650bc3920c9fbc78a330ecf9d7db67e0cb8f
Download: download sample
Signature CobaltStrike
File size:14'336 bytes
First seen:2021-03-17 12:35:18 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash dc25ee78e2ef4d36faa0badf1e7461c9 (118 x CobaltStrike, 5 x Cobalt Strike)
ssdeep 192:AsH+DgGK83SxHn2OQ/dmBI4KBfTgir+xz0eAu8nbqUqV/Qjo7AGa:AA+kGKqbOCdWIVBff+xz0eAuifCXAn
Threatray 239 similar samples on MalwareBazaar
TLSH 08521935EA4378F2FD1A897004EAB6FFAFB3E2238C105CD6CF94E94158234A9480665D
Reporter JAMESWT_WT
Tags:CobaltStrike

Intelligence


File Origin
# of uploads :
1
# of downloads :
519
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
f4ca63aeb4e3246c5d923942497d650bc3920c9fbc78a330ecf9d7db67e0cb8f
Verdict:
Suspicious activity
Analysis date:
2021-03-17 12:55:24 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a custom TCP request
DNS request
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
CobaltStrike
Detection:
malicious
Classification:
troj
Score:
72 / 100
Signature
Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected CobaltStrike
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.CobaltStrike
Status:
Malicious
First seen:
2021-03-11 01:17:00 UTC
File Type:
PE (Exe)
AV detection:
24 of 28 (85.71%)
Threat level:
  5/5
Result
Malware family:
metasploit
Score:
  10/10
Tags:
family:cobaltstrike family:metasploit backdoor trojan
Behaviour
Modifies system certificate store
Cobaltstrike
MetaSploit
Malware Config
C2 Extraction:
http://143.110.225.14:443/api/v1/user/512/avatar
http://ajax.microsoft.com:443/api2/json/cluster/tasks
http://ajax.microsoft.com:443/v3/links/ping-centre
Unpacked files
SH256 hash:
f4ca63aeb4e3246c5d923942497d650bc3920c9fbc78a330ecf9d7db67e0cb8f
MD5 hash:
19cbc0f0a9b33c122f2ff1291f6e678a
SHA1 hash:
3f1b5a1a9462aaacccc236ca0d939fb1e99031f2
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments