MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1b11ae98b85bb0645abe36adcd852e6e84b51c6b5c811729f3c19f14f32d4e4f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 1b11ae98b85bb0645abe36adcd852e6e84b51c6b5c811729f3c19f14f32d4e4f
SHA3-384 hash: 6af99811ae0d37d172cdeb046bce94d46b4bc13cf232b07c78468d79eb147c3008ae92226217b8b68cc2a905119278e7
SHA1 hash: c3e206b0babe20ffd9663a4e28272ef6c24bab8a
MD5 hash: 3a11f98d3d4fb8df67c97dc1bd06ff2e
humanhash: asparagus-lemon-orange-iowa
File name:abbb.dll
Download: download sample
Signature CobaltStrike
File size:389'264 bytes
First seen:2021-07-20 02:18:08 UTC
Last seen:2021-07-20 06:07:25 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash b9096259d2afac167634d3bd1abea961 (1 x CobaltStrike)
ssdeep 6144:20mFPYOfTRbxLcXBf0PgrlIWmaSN24y+mIck5JkEbcrOYQpu3GP8r40k0akKf:xYP7RbxLa0T3k2c4Jxcrtdx5k0ab
Threatray 979 similar samples on MalwareBazaar
TLSH T10484F1A7B1E004BBE076D234C8A30916EB7278411B61DF7F02A4926A1F677E15D3EB71
Reporter Anonymous
Tags:CobaltStrike exe MS Corporation Sofware Ltd signed

Code Signing Certificate

Organisation:MS Corporation Sofware Ltd
Issuer:COMODO RSA Extended Validation Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:2021-05-10T00:00:00Z
Valid to:2023-05-10T23:59:59Z
Serial number: da49c0bacfd878b4949820e9ac0f168a
Intelligence: 3 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 25c0bf5bb5656c069e324244d52b8c0a4d066a5571ed24609887c6b79a48afdd
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
513
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
abbb.dll
Verdict:
No threats detected
Analysis date:
2021-07-20 02:19:14 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
CobaltStrike
Detection:
malicious
Classification:
troj.evad
Score:
72 / 100
Signature
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected CobaltStrike
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 451033 Sample: abbb.dll Startdate: 20/07/2021 Architecture: WINDOWS Score: 72 16 Found malware configuration 2->16 18 Multi AV Scanner detection for submitted file 2->18 20 Yara detected CobaltStrike 2->20 22 C2 URLs / IPs found in malware configuration 2->22 7 loaddll64.exe 1 2->7         started        process3 signatures4 24 Contains functionality to inject code into remote processes 7->24 10 cmd.exe 1 7->10         started        12 rundll32.exe 7->12         started        process5 process6 14 rundll32.exe 10->14         started       
Threat name:
Win64.Trojan.CobaltStrike
Status:
Malicious
First seen:
2021-07-15 17:17:16 UTC
File Type:
PE+ (Dll)
Extracted files:
1
AV detection:
5 of 46 (10.87%)
Threat level:
  5/5
Result
Malware family:
cobaltstrike
Score:
  10/10
Tags:
family:cobaltstrike backdoor trojan
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Cobaltstrike
Unpacked files
SH256 hash:
1b11ae98b85bb0645abe36adcd852e6e84b51c6b5c811729f3c19f14f32d4e4f
MD5 hash:
3a11f98d3d4fb8df67c97dc1bd06ff2e
SHA1 hash:
c3e206b0babe20ffd9663a4e28272ef6c24bab8a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments