MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 16fbf35ccfa2ba2d6954c266d18f7b62a8ccc72d83a8a79c3ad810ea68e4aa93. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
CobaltStrike
Vendor detections: 15
| SHA256 hash: | 16fbf35ccfa2ba2d6954c266d18f7b62a8ccc72d83a8a79c3ad810ea68e4aa93 |
|---|---|
| SHA3-384 hash: | ead06e3e871292467d9e3e1fc8c7aa9a2008a6f05df6ebe5125999bb6ac1dd12c2a56a535a70c5972cf8cff85ee9102f |
| SHA1 hash: | aed115066979e6abebad02f7087f0b50c27963c9 |
| MD5 hash: | 64397899c5cd141e6c5da7aab56f0f42 |
| humanhash: | red-thirteen-north-pasta |
| File name: | p86.exe |
| Download: | download sample |
| Signature | CobaltStrike |
| File size: | 2'423'296 bytes |
| First seen: | 2024-05-09 19:46:31 UTC |
| Last seen: | 2024-05-09 20:25:12 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 94f69b864f86c56c1c27a0b4a51494e6 (1 x CobaltStrike) |
| ssdeep | 49152:7lh/6RSrfo3kS9DpvJ4g4REgBCUp6YnUAQJ8GqGGR6MTX1d:7f6Uw0SdpvJx4REiCUp6YnUAQVYhTX1d |
| Threatray | 14 similar samples on MalwareBazaar |
| TLSH | T19FB58E313AB0C46AD1931F32AA49B73934BDF6380676E1AF57850E285DB49435E18FE3 |
| TrID | 50.1% (.CPL) Windows Control Panel Item (generic) (57583/11/19) 27.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 9.1% (.EXE) Win64 Executable (generic) (10523/12/4) 4.3% (.EXE) Win16 NE executable (generic) (5038/12/1) 3.9% (.EXE) Win32 Executable (generic) (4504/4/1) |
| Reporter | Anonymous |
| Tags: | CobaltStrike exe |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Unpacked files
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | Beacon_K5om |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Meterpreter Beacon - file K5om.dll |
| Reference: | https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html |
| Rule name: | Beacon_K5om_RID2B14 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Meterpreter Beacon - file K5om.dll |
| Reference: | https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html |
| Rule name: | Check_OutputDebugStringA_iat |
|---|
| Rule name: | Cobaltstrike1 |
|---|---|
| Author: | Ahmet Payaslioglu | Binalyze DFIR LAB |
| Description: | Cobalt Strike Detection |
| Rule name: | Cobaltstrike2 |
|---|---|
| Author: | Ahmet Payaslioglu | Binalyze DFIR LAB |
| Description: | Cobalt Strike Detection |
| Rule name: | Cobaltstrike3 |
|---|---|
| Author: | Ahmet Payaslioglu | Binalyze DFIR LAB |
| Description: | Cobalt Strike Detection |
| Rule name: | CobaltStrikeBeacon |
|---|---|
| Author: | ditekshen, enzo & Elastic |
| Description: | Cobalt Strike Beacon Payload |
| Rule name: | CobaltStrike_C2_Encoded_XOR_Config_Indicator |
|---|---|
| Author: | yara@s3c.za.net |
| Description: | Detects CobaltStrike C2 encoded profile configuration |
| Rule name: | CobaltStrike_ReflectiveLoader_RID3297 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects reflective loader (Cobalt Strike) |
| Reference: | http://www.clearskysec.com/tulip |
| Rule name: | CobaltStrike_Sleeve_BeaconLoader_x86_o_v4_3_v4_4_v4_5_and_v4_6 |
|---|---|
| Author: | gssincla@google.com |
| Description: | Cobalt Strike's sleeve/BeaconLoader.x86.o Versions 4.3 through at least 4.6 |
| Reference: | https://cloud.google.com/blog/products/identity-security/making-cobalt-strike-harder-for-threat-actors-to-abuse |
| Rule name: | CobaltStrike_Unmodifed_Beacon |
|---|---|
| Author: | yara@s3c.za.net |
| Description: | Detects unmodified CobaltStrike beacon DLL |
| Rule name: | CobaltStrike__Sleeve_BeaconLoader_x86_o_v4_3_v4_4_v4_5_and_v4_6 |
|---|---|
| Author: | gssincla@google.com |
| Rule name: | crime_win32_csbeacon_1 |
|---|---|
| Author: | @VK_Intel |
| Description: | Detects Cobalt Strike loader |
| Reference: | https://twitter.com/VK_Intel/status/1239632822358474753 |
| Rule name: | CS_beacon |
|---|---|
| Author: | Etienne Maynier tek@randhome.io |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | HKTL_CobaltStrike_Beacon_Strings |
|---|---|
| Author: | Elastic |
| Description: | Identifies strings used in Cobalt Strike Beacon DLL |
| Reference: | https://www.elastic.co/blog/detecting-cobalt-strike-with-memory-signatures |
| Rule name: | HKTL_Meterpreter_inMemory |
|---|---|
| Author: | netbiosX, Florian Roth |
| Description: | Detects Meterpreter in-memory |
| Reference: | https://www.reddit.com/r/purpleteamsec/comments/hjux11/meterpreter_memory_indicators_detection_tooling/ |
| Rule name: | HKTL_Win_CobaltStrike |
|---|---|
| Author: | threatintel@volexity.com |
| Description: | The CobaltStrike malware family. |
| Reference: | https://www.volexity.com/blog/2021/05/27/suspected-apt29-operation-launches-election-fraud-themed-phishing-campaigns/ |
| Rule name: | INDICATOR_SUSPICIOUS_ReflectiveLoader |
|---|---|
| Author: | ditekSHen |
| Description: | Detects Reflective DLL injection artifacts |
| Rule name: | Leviathan_CobaltStrike_Sample_1 |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Cobalt Strike sample from Leviathan report |
| Reference: | https://goo.gl/MZ7dRg |
| Rule name: | Leviathan_CobaltStrike_Sample_1_RID3324 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Cobalt Strike sample from Leviathan report |
| Reference: | https://goo.gl/MZ7dRg |
| Rule name: | maldoc_find_kernel32_base_method_1 |
|---|---|
| Author: | Didier Stevens (https://DidierStevens.com) |
| Rule name: | maldoc_getEIP_method_1 |
|---|---|
| Author: | Didier Stevens (https://DidierStevens.com) |
| Rule name: | malware_CobaltStrike_v3v4 |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect CobaltStrike Beacon in memory |
| Reference: | https://blogs.jpcert.or.jp/en/2018/08/volatility-plugin-for-detecting-cobalt-strike-beacon.html |
| Rule name: | Malware_QA_vqgk |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | VT Research QA uploaded malware - file vqgk.dll |
| Reference: | VT Research QA |
| Rule name: | malware_shellcode_hash |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect shellcode api hash value |
| Rule name: | MALWARE_Win_CobaltStrike |
|---|---|
| Author: | ditekSHen |
| Description: | CobaltStrike payload |
| Rule name: | meth_get_eip |
|---|---|
| Author: | Willi Ballenthin |
| Rule name: | meth_peb_parsing |
|---|---|
| Author: | Willi Ballenthin |
| Rule name: | meth_stackstrings |
|---|---|
| Author: | Willi Ballenthin |
| Rule name: | PowerShell_Susp_Parameter_Combo_RID336F |
|---|---|
| Author: | Florian Roth |
| Description: | Detects PowerShell invocation with suspicious parameters |
| Reference: | https://goo.gl/uAic1X |
| Rule name: | ReflectiveLoader |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended |
| Reference: | Internal Research |
| Rule name: | SUSP_XORed_Mozilla |
|---|---|
| Author: | Florian Roth |
| Description: | Detects suspicious single byte XORed keyword 'Mozilla/5.0' - it uses yara's XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key. |
| Reference: | https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force() |
| Rule name: | SUSP_XORed_Mozilla_RID2DB4 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects suspicious XORed keyword - Mozilla/5.0 |
| Reference: | Internal Research |
| Rule name: | ThreadControl__Context |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | troj_win_cobaltstrike_memoryinject |
|---|---|
| Author: | Jeff White (karttoon@gmail.com) @noottrak |
| Description: | Detects Cobalt Strike payload typically loaded into memory via PowerShell. |
| Rule name: | WiltedTulip_ReflectiveLoader |
|---|---|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip |
| Reference: | http://www.clearskysec.com/tulip |
| Rule name: | Windows_Trojan_CobaltStrike_1787eef5 |
|---|---|
| Author: | Elastic Security |
| Description: | CS shellcode variants |
| Rule name: | Windows_Trojan_CobaltStrike_3dc22d14 |
|---|---|
| Author: | Elastic Security |
| Rule name: | Windows_Trojan_CobaltStrike_7f8da98a |
|---|---|
| Author: | Elastic Security |
| Rule name: | Windows_Trojan_CobaltStrike_ee756db7 |
|---|---|
| Description: | Attempts to detect Cobalt Strike based on strings found in BEACON |
| Rule name: | Windows_Trojan_CobaltStrike_f0b627fc |
|---|---|
| Description: | Rule for beacon reflective loader |
| Rule name: | Windows_Trojan_Metasploit_7bc0f998 |
|---|---|
| Description: | Identifies the API address lookup function leverage by metasploit shellcode |
| Rule name: | Windows_Trojan_Metasploit_c9773203 |
|---|---|
| Author: | Elastic Security |
| Description: | Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. |
| Reference: | https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm |
| Rule name: | win_cobaltstrike_pipe_strings_nov_2023 |
|---|---|
| Author: | Matthew @ Embee_Research |
| Description: | Detects default strings related to cobalt strike named pipes |
| Rule name: | win_cobalt_strike_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.cobalt_strike. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_NX | Missing Non-Executable Memory Protection | critical |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| AUTH_API | Manipulates User Authorization | ADVAPI32.dll::AllocateAndInitializeSid ADVAPI32.dll::FreeSid ADVAPI32.dll::GetLengthSid ADVAPI32.dll::InitializeAcl ADVAPI32.dll::InitializeSecurityDescriptor ADVAPI32.dll::MakeSelfRelativeSD |
| COM_BASE_API | Can Download & Execute components | ole32.dll::CLSIDFromProgID ole32.dll::CoCreateInstance ole32.dll::CoFreeUnusedLibraries ole32.dll::CreateStreamOnHGlobal |
| GDI_PLUS_API | Interfaces with Graphics | gdiplus.dll::GdiplusStartup gdiplus.dll::GdiplusShutdown gdiplus.dll::GdipDeleteGraphics gdiplus.dll::GdipAlloc gdiplus.dll::GdipCreateFromHDC |
| MULTIMEDIA_API | Can Play Multimedia | WINMM.dll::PlaySoundW |
| SECURITY_BASE_API | Uses Security Base API | ADVAPI32.dll::AddAccessAllowedAce ADVAPI32.dll::SetSecurityDescriptorDacl |
| SHELL_API | Manipulates System Shell | SHELL32.dll::ShellExecuteW SHELL32.dll::SHGetFileInfoW |
| WIN32_PROCESS_API | Can Create Process and Threads | KERNEL32.dll::CloseHandle KERNEL32.dll::CreateThread |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess KERNEL32.dll::LoadLibraryA KERNEL32.dll::LoadLibraryExW KERNEL32.dll::LoadLibraryW KERNEL32.dll::GetDriveTypeW KERNEL32.dll::GetVolumeInformationW |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::WriteConsoleW KERNEL32.dll::ReadConsoleW KERNEL32.dll::SetStdHandle KERNEL32.dll::GetConsoleMode KERNEL32.dll::GetConsoleCP |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CopyFileW KERNEL32.dll::CreateFileW KERNEL32.dll::DeleteFileW SHLWAPI.dll::PathRemoveFileSpecW KERNEL32.dll::MoveFileExW KERNEL32.dll::GetWindowsDirectoryW |
| WIN_REG_API | Can Manipulate Windows Registry | ADVAPI32.dll::RegCreateKeyExW ADVAPI32.dll::RegDeleteKeyW ADVAPI32.dll::RegOpenKeyExW ADVAPI32.dll::RegQueryValueW ADVAPI32.dll::RegQueryValueExW ADVAPI32.dll::RegSetValueExW |
| WIN_USER_API | Performs GUI Actions | USER32.dll::AppendMenuW USER32.dll::CreateMenu ole32.dll::OleCreateMenuDescriptor USER32.dll::EmptyClipboard USER32.dll::OpenClipboard USER32.dll::PeekMessageW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.