MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 31bffcb4afdba092230c1e621a8259aff530d812ababfe2d34af5fbfea827efd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 31bffcb4afdba092230c1e621a8259aff530d812ababfe2d34af5fbfea827efd
SHA3-384 hash: b36c35be050dcb1e99bfa34c6814df99d05f3f0fc24f57c1d643c303375833894c856d123af93a41949a2aa1a2e3c2f8
SHA1 hash: cbc212f9d32f00d714914a852e4f9f3cc4d8a2b3
MD5 hash: dea14dc21e436eaaa3c8ee35fac3e7fa
humanhash: magnesium-eleven-tennis-mockingbird
File name:31bffcb4afdba092230c1e621a8259aff530d812ababfe2d34af5fbfea827efd.bin
Download: download sample
Signature CobaltStrike
File size:39'752 bytes
First seen:2021-05-31 11:19:53 UTC
Last seen:2021-05-31 12:16:20 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 100785cfba4c2db8d721246d848afb79 (1 x CobaltStrike)
ssdeep 768:nCAL3okCH2ShmOg6MlluSaSxkFIwzJKmfk5ipiRGp9E+StU:nIHdm/PjaSoIwzJ/k5ipioQ+S+
Threatray 892 similar samples on MalwareBazaar
TLSH 4603287179A19384FD61C87241FD56E9B921B7308B5923EBD274C623CE636D0ADB0C9C
Reporter JAMESWT_WT
Tags:1.A Connect GmbH CobaltStrike exe signed

Code Signing Certificate

Organisation:1.A Connect GmbH
Issuer:COMODO RSA Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:2018-08-13T00:00:00Z
Valid to:2022-08-13T23:59:59Z
Serial number: a7e4ded4bf949d15aa4201843f1ab64d
Intelligence: 30 malware samples on MalwareBazaar are signed with this code signing certificate
MalwareBazaar Blocklist:This certificate is on the MalwareBazaar code signing certificate blocklist (CSCB)
Thumbprint Algorithm:SHA256
Thumbprint: d519622e7d1eab2c240860d38779704319f1349cc57ab8c3d51d9f56145b582f
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
522
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
31bffcb4afdba092230c1e621a8259aff530d812ababfe2d34af5fbfea827efd.bin
Verdict:
No threats detected
Analysis date:
2021-05-31 11:38:18 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a custom TCP request
Sending a UDP request
Creating a window
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
CobaltStrike
Detection:
malicious
Classification:
troj
Score:
76 / 100
Signature
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected CobaltStrike
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.Shelma
Status:
Malicious
First seen:
2021-04-14 00:50:12 UTC
File Type:
PE+ (Exe)
Extracted files:
2
AV detection:
21 of 45 (46.67%)
Threat level:
  5/5
Result
Malware family:
cobaltstrike
Score:
  10/10
Tags:
family:cobaltstrike botnet:305419896 backdoor trojan
Behaviour
Cobaltstrike
Malware Config
C2 Extraction:
http://27.221.119.231:443/jquery-3.3.2.2.slim.min.js
http://60.31.184.208:443/jquery-3.3.1.1.min.js
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments