MalwareBazaar Database

This page shows some basic information the YARA rule CobaltStrike_C2_Encoded_Config_Indicator including corresponding malware samples.

Database Entry


YARA Rule:CobaltStrike_C2_Encoded_Config_Indicator
Author:yara@s3c.za.net
Description:Detects CobaltStrike C2 encoded profile configuration
Firstseen:2020-03-18 21:55:26 UTC
Lastseen:2021-06-18 07:32:40 UTC
Sightings:432

Malware Samples


The table below shows all malware samples that matching this particular YARA rule (max 1000).

Firstseen (UTC)SHA256 hashTagsSignatureReporter