MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 12e1f50d7c9cf546c90545588bc369fa90e03f2370883e7befd87e4d50ebf0df. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 13


Intelligence 13 IOCs YARA 5 File information Comments

SHA256 hash: 12e1f50d7c9cf546c90545588bc369fa90e03f2370883e7befd87e4d50ebf0df
SHA3-384 hash: 093a0792c242f28a8870f0b9a49f5ae00846d5e4be2ff14957772b740c73e64463887d9046f407fb5ffc465fb824f375
SHA1 hash: b8d9bba99d9777c43b96f338f5bc3a08201fa05c
MD5 hash: af43e0c21ddf7e4e087cdab2ac8d2948
humanhash: hamper-artist-speaker-mockingbird
File name:af43e0c21ddf7e4e087cdab2ac8d2948.exe
Download: download sample
Signature CobaltStrike
File size:871'527 bytes
First seen:2023-09-04 17:14:40 UTC
Last seen:2023-09-04 17:30:43 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 0ae9e38912ff6bd742a1b9e5c003576a (10 x DCRat, 7 x RedLineStealer, 4 x AsyncRAT)
ssdeep 12288:GtH5NLaAdDhAAEIFbX+tZjzpGji6YBWpW0b0pFhikIU2VyHx75DbBlqmlMQ2:GtH5sAdXEIFkj9h3WbbmJIWHGmlu
Threatray 1'169 similar samples on MalwareBazaar
TLSH T1C3050201BAC086B1D12218334A699F20FA7DBC301F7549E7A3D4596EEE371D09B35BB6
TrID 32.2% (.EXE) Win64 Executable (generic) (10523/12/4)
20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
13.7% (.EXE) Win32 Executable (generic) (4505/5/1)
6.2% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon 9494b494d4aeaeac (904 x DCRat, 483 x NirCmd, 172 x RedLineStealer)
Reporter smica83
Tags:apt APT27 Cobalt Strike CobaltStrike exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
469
Origin country :
HU HU
Vendor Threat Intelligence
Malware family:
cobaltstrike
ID:
1
File name:
af43e0c21ddf7e4e087cdab2ac8d2948.exe
Verdict:
Malicious activity
Analysis date:
2023-09-04 17:15:38 UTC
Tags:
cobaltstrike

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
CobaltStrikeBeacon
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm cobaltstrike explorer greyware hyperbro lolbin lolbin overlay packed remote setupapi shdocvw shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
CobaltStrike
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to hide windows to a different desktop
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected CobaltStrike
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1303079 Sample: FWWN0aJ2Xv.exe Startdate: 04/09/2023 Architecture: WINDOWS Score: 100 29 Found malware configuration 2->29 31 Malicious sample detected (through community Yara rule) 2->31 33 Antivirus detection for URL or domain 2->33 35 6 other signatures 2->35 7 FWWN0aJ2Xv.exe 4 7 2->7         started        10 OpenWith.exe 16 9 2->10         started        process3 file4 21 C:\ProgramData\vfhost.exe, PE32 7->21 dropped 23 C:\ProgramData\VFTRACE.dll, PE32 7->23 dropped 12 vfhost.exe 7->12         started        16 AcroRd32.exe 15 37 7->16         started        process5 dnsIp6 27 38.54.119.239, 443, 49718, 49719 COGENT-174US United States 12->27 37 Contains functionality to hide windows to a different desktop 12->37 18 RdrCEF.exe 69 16->18         started        signatures7 process8 dnsIp9 25 192.168.2.1 unknown unknown 18->25
Threat name:
Win32.Trojan.Uztuby
Status:
Malicious
First seen:
2023-08-24 11:47:06 UTC
File Type:
PE (Exe)
Extracted files:
68
AV detection:
22 of 38 (57.89%)
Threat level:
  5/5
Result
Malware family:
cobaltstrike
Score:
  10/10
Tags:
family:cobaltstrike botnet:100000000 backdoor trojan
Behaviour
Checks processor information in registry
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Cobaltstrike
Malware Config
C2 Extraction:
http://38.54.119.239:443/jquery-3.3.1.min.js
Unpacked files
SH256 hash:
ccc00ac5886636c794d9047fe46c6db02166d79db049f6953c572508c554bb30
MD5 hash:
b62b3dd787d906842f7c65c844190788
SHA1 hash:
be165c73138eb305964e23760bbed7812fba1622
SH256 hash:
df61e048b9ea8a64b5640153eccfa3a7b777d7131d54b7316fa68d015515138f
MD5 hash:
4e451aa0f1af123c40e66b86a4e43441
SHA1 hash:
c77a2ecd4b9a1d55f2e16f57b9e1cf1a869751c1
SH256 hash:
12e1f50d7c9cf546c90545588bc369fa90e03f2370883e7befd87e4d50ebf0df
MD5 hash:
af43e0c21ddf7e4e087cdab2ac8d2948
SHA1 hash:
b8d9bba99d9777c43b96f338f5bc3a08201fa05c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SelfExtractingRAR
Author:Xavier Mertens
Description:Detects an SFX archive with automatic script execution
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments