MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3e6c11f27c1309c63abe0a1563c6141ce7b8d8110419c572be46dcb3578db443. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 3e6c11f27c1309c63abe0a1563c6141ce7b8d8110419c572be46dcb3578db443
SHA3-384 hash: 37826ae0c5f1057fa578915b9fdef71ba1940b8a74dd2e5decf019d7d02d4b2153829d8b2ad0eca096b6cb32eeaec7d6
SHA1 hash: 506ee5fd0365f20a8022187004a169edb70f45b3
MD5 hash: a3cad4f0caf2af2d2dd31aa6ea1b1af4
humanhash: bakerloo-early-eighteen-robert
File name:index.dll
Download: download sample
Signature CobaltStrike
File size:413'184 bytes
First seen:2020-07-21 08:41:39 UTC
Last seen:2020-07-21 11:44:06 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 336a79477e6c3dc5c3e10256c7261509 (3 x CobaltStrike)
ssdeep 12288:tqsRv/JXAz/JjGqGFSxwq5PbhbyfPqzUOZPB:fRvxwU9sOkbhEPqzLd
Threatray 2'659 similar samples on MalwareBazaar
TLSH A994E067B2A654BBD0228275C1E30106F376BC511B65CBEF036446AB5F273909EBEB31
Reporter abuse_ch
Tags:CobaltStrike dll


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: s99.radiancetech.net
Sending IP: 210.193.49.209
From: Connor Bucklin <lsme@lsme.com.sg>
Subject: Connor from Ensilica Limited
Attachment: Products_data_20200772.xls

Unknown payload URL:
http://51.77.103.125/api.php
http://104.243.34.50/index.dll

Unknown C2s:
65aa694bba.hosting-64.xyz
def0192jery.netf30813.monster
commandline.pipelevel64.xyz
proxied.2-server.xyz
cloudtraffic.media64.xyz
contentdnet.netw32.xyz
cloudconf.pipe-64.xyz

Intelligence


File Origin
# of uploads :
3
# of downloads :
108
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 248771 Sample: index.dll Startdate: 21/07/2020 Architecture: WINDOWS Score: 48 25 Multi AV Scanner detection for submitted file 2->25 8 loaddll64.exe 1 2->8         started        process3 process4 10 cmd.exe 1 8->10         started        12 regsvr32.exe 8->12         started        process5 14 iexplore.exe 5 74 10->14         started        process6 16 iexplore.exe 3 153 14->16         started        dnsIp7 19 edge.gycpi.b.yahoodns.net 87.248.118.22, 443, 49755, 49756 YAHOO-DEBDE United Kingdom 16->19 21 pagead.l.doubleclick.net 172.217.16.162, 443, 49735, 49736 GOOGLEUS United States 16->21 23 19 other IPs or domains 16->23
Threat name:
Win64.Trojan.TrickBot
Status:
Malicious
First seen:
2020-07-21 07:02:00 UTC
File Type:
PE+ (Dll)
AV detection:
20 of 29 (68.97%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

CobaltStrike

Executable exe 3e6c11f27c1309c63abe0a1563c6141ce7b8d8110419c572be46dcb3578db443

(this sample)

Comments