MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2d50d998dad3ab33912af2b6c05e254fc781a9a10daf75a5e85dcbf71fc5bfdf. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 2d50d998dad3ab33912af2b6c05e254fc781a9a10daf75a5e85dcbf71fc5bfdf
SHA3-384 hash: 9c91b5e46cd88baf926990e1073df37513008135a49def9bfd9e170fbefbb91627462e21235a0c71c17eefbc4c0af49a
SHA1 hash: 2e206e749d3a1f5647e05b2a09b30aed421ea4a0
MD5 hash: 7ea7a4d10b0166df165f94a71a481bc8
humanhash: pasta-asparagus-eighteen-diet
File name:206.exe
Download: download sample
Signature CobaltStrike
File size:33'760 bytes
First seen:2021-09-01 07:49:21 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d8f109ce84cd972c08805582eb9f5af4 (2 x CobaltStrike)
ssdeep 768:FcfnvkobbVEHyeITKn27NWx8h/xUh55Yimm2oF:FSxbbGtIsAE8a7mmjF
Threatray 20 similar samples on MalwareBazaar
TLSH T190E28D9B42580C29E817C939DF81D82BEEB0F8415AB4835F132995A94F63372B4FE334
Reporter JAMESWT_WT
Tags:CobaltStrike exe HasCred ApS signed

Code Signing Certificate

Organisation:HasCred ApS
Issuer:DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1
Algorithm:sha256WithRSAEncryption
Valid from:2021-08-17T00:00:00Z
Valid to:2022-08-02T23:59:59Z
Serial number: 0bc9b800f480691bd6b60963466b0c75
Intelligence: 7 malware samples on MalwareBazaar are signed with this code signing certificate
MalwareBazaar Blocklist:This certificate is on the MalwareBazaar code signing certificate blocklist (CSCB)
Thumbprint Algorithm:SHA256
Thumbprint: 1a969ab1408c6de5689ece63e3200ac2d5cf7ae2e811c6756e3f39578a45053e
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
531
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
206.exe
Verdict:
No threats detected
Analysis date:
2021-09-01 07:50:07 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
DNS request
Connection attempt
Sending a custom TCP request
Sending a UDP request
Result
Threat name:
CobaltStrike
Detection:
malicious
Classification:
troj
Score:
84 / 100
Signature
C2 URLs / IPs found in malware configuration
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected CobaltStrike
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.Generic
Status:
Suspicious
First seen:
2021-08-31 15:50:18 UTC
File Type:
PE+ (Exe)
Extracted files:
1
AV detection:
9 of 45 (20.00%)
Threat level:
  5/5
Result
Malware family:
cobaltstrike
Score:
  10/10
Tags:
family:cobaltstrike botnet:0 backdoor trojan
Behaviour
Modifies system certificate store
Cobaltstrike
Malware Config
C2 Extraction:
http://kevinjohan.com:443/jquery-3.3.1.min.js
Unpacked files
SH256 hash:
2d50d998dad3ab33912af2b6c05e254fc781a9a10daf75a5e85dcbf71fc5bfdf
MD5 hash:
7ea7a4d10b0166df165f94a71a481bc8
SHA1 hash:
2e206e749d3a1f5647e05b2a09b30aed421ea4a0
Malware family:
Cobalt Strike
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CobaltStrike

Executable exe 2d50d998dad3ab33912af2b6c05e254fc781a9a10daf75a5e85dcbf71fc5bfdf

(this sample)

  
Delivery method
Distributed via web download

Comments