MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 060500558c754696c0056ec073344071c058d198ea0dba06632f93edb1276624. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 060500558c754696c0056ec073344071c058d198ea0dba06632f93edb1276624
SHA3-384 hash: cb8e15e7072a2d8c57d2c05e641ee423781ee1a9b7069fa112661a3eaa12ee8e9698ac5bc5030ee38f8a64d00896b559
SHA1 hash: dde6fd2b77bf994831e1238786cd1d6834c60731
MD5 hash: ac35e2b43b2da7c23c1863c66cf407f4
humanhash: magazine-butter-mike-undress
File name:SimpleDateTime.exe
Download: download sample
Signature CobaltStrike
File size:36'864 bytes
First seen:2020-11-04 21:48:07 UTC
Last seen:2020-11-04 23:39:57 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 43e5b039b1f9f3684add8eabfb2166c0 (1 x CobaltStrike)
ssdeep 192:/TaQQJobRyDHdu+k/E4Hscu07xSselWxXOivUmCwUGGgJWqQkoDXx9NMpZeocvOa:/ToAIjeNmlWxXOivUm3UGfWyyDNa
Threatray 3'343 similar samples on MalwareBazaar
TLSH 4EF24335A978102AF767F6719AC18567E6D47C3239116D22FE872B0C29368C3B3E152F
Reporter James_inthe_box
Tags:CobaltStrike exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
116
Origin country :
n/a
Vendor Threat Intelligence
Detection:
CobaltStrikeBeacon
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Sending a custom TCP request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
rans
Score:
64 / 100
Signature
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Potential malicious icon found
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.Snojan
Status:
Malicious
First seen:
2020-11-04 21:48:02 UTC
File Type:
PE (Exe)
Extracted files:
6
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
cobaltstrike
Score:
  10/10
Tags:
family:cobaltstrike backdoor trojan
Behaviour
Suspicious use of SetWindowsHookEx
Cobaltstrike
Malware Config
C2 Extraction:
http://217.12.208.31:443/questions/32251816/c-sharp-directives-compilation-error
Unpacked files
SH256 hash:
060500558c754696c0056ec073344071c058d198ea0dba06632f93edb1276624
MD5 hash:
ac35e2b43b2da7c23c1863c66cf407f4
SHA1 hash:
dde6fd2b77bf994831e1238786cd1d6834c60731
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments