MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 24676397320c85928b2fc53501109d63f3fb34a6aba00446c7ed5fbd272fda8b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 24676397320c85928b2fc53501109d63f3fb34a6aba00446c7ed5fbd272fda8b
SHA3-384 hash: 9c1a4c231c4a63339c005830b348ddc332913cafee9a0f703ed6d395c412eb08058a764411c4d4642c9f8a9e6dc20f21
SHA1 hash: f06d8438507cec6ef71ebfedca221d439f8d3a8c
MD5 hash: ad93ca38c07a1882cb07bcab30dbb267
humanhash: north-robin-stairway-monkey
File name:24676397320c85928b2fc53501109d63f3fb34a6aba00446c7ed5fbd272fda8b
Download: download sample
File size:1'330'245 bytes
First seen:2020-09-08 12:17:31 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7cc5de4b0f816307ab343372c371bf8a (1 x CobaltStrike)
ssdeep 24576:SwFm96EJC1yv5QZOPWBkg2UnSq+nNR/Mocgwzs9zz6KixATMVT:SwFm9ZCLLz2USqcMoca7RTe
TLSH 7E552311E79CAC81E6CA74F641236F2C8FBA732D197687EE9E466808FE37543093D584
Reporter JAMESWT_WT
Tags:47.240.45.183

Intelligence


File Origin
# of uploads :
1
# of downloads :
95
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a file
Creating a process from a recently created file
Creating a file in the %temp% subdirectories
Creating a window
Searching for the window
Delayed writing of the file
Changing a file
DNS request
Sending a custom TCP request
Moving a recently created file
Sending an HTTP GET request
Threat name:
Win32.Trojan.Cobalt
Status:
Malicious
First seen:
2020-04-07 23:01:25 UTC
File Type:
PE (Exe)
Extracted files:
268
AV detection:
27 of 29 (93.10%)
Threat level:
  5/5
Result
Malware family:
metasploit
Score:
  10/10
Tags:
trojan backdoor family:metasploit
Behaviour
Modifies Internet Explorer settings
Modifies system certificate store
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Loads dropped DLL
Executes dropped EXE
MetaSploit
Malware Config
C2 Extraction:
http://47.240.45.183:60002/WJBy
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments