MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3f9cf521bf11dfe1a5b6baebde88f8eaac8e851ed8bcf220109d081b4a3f0b6f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments 1

SHA256 hash: 3f9cf521bf11dfe1a5b6baebde88f8eaac8e851ed8bcf220109d081b4a3f0b6f
SHA3-384 hash: f55a2195356716dd933020d304f74942ef54946549133d4a35646a7a853f3faef1b0e35643e98b7ce39a0eb639f2f472
SHA1 hash: b526df575129071d4627dbe0b27f40e525dd0c43
MD5 hash: fc008b1ff424b45bc9e616cfd8aaeae4
humanhash: uniform-apart-avocado-mobile
File name:fc008b1f_by_Libranalysis
Download: download sample
Signature CobaltStrike
File size:833'024 bytes
First seen:2021-05-03 14:01:04 UTC
Last seen:2021-05-03 15:00:58 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 3152e319e922f8cd1a9f16607dbc1b2f (1 x CobaltStrike)
ssdeep 6144:MGzk0jK11CQ2f9gNp/9wg1DBNDhcH8VyVb/eAvu1JC0G2:MGzJ+1wvf9ap/RBNdcHoub/Bu15L
Threatray 267 similar samples on MalwareBazaar
TLSH 8F055A19FA877A31EECD2C71D52EF47E59F018226F5AED09E8690C7B32819B9D153E00
Reporter Libranalysis
Tags:CobaltStrike


Avatar
Libranalysis
Uploaded as part of the sample sharing project

Intelligence


File Origin
# of uploads :
2
# of downloads :
492
Origin country :
n/a
Vendor Threat Intelligence
Detection:
CobaltStrikeBeacon
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Running batch commands
Creating a process with a hidden window
Creating a file in the %temp% directory
Deleting a recently created file
Connection attempt
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
CobaltStrike
Detection:
malicious
Classification:
troj
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: BlueMashroom DLL Load
Sigma detected: Koadic Execution
Sigma detected: NotPetya Ransomware Activity
Sigma detected: QBot Process Creation
Sigma detected: System File Execution Location Anomaly
Yara detected CobaltStrike
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Jobutyve
Status:
Malicious
First seen:
2021-04-07 13:23:48 UTC
AV detection:
17 of 29 (58.62%)
Threat level:
  5/5
Result
Malware family:
cobaltstrike
Score:
  10/10
Tags:
family:cobaltstrike botnet:0 backdoor trojan
Behaviour
Suspicious use of WriteProcessMemory
Cobaltstrike
Malware Config
C2 Extraction:
http://192.99.250.7:80/r-arrow.js
Unpacked files
SH256 hash:
3f9cf521bf11dfe1a5b6baebde88f8eaac8e851ed8bcf220109d081b4a3f0b6f
MD5 hash:
fc008b1ff424b45bc9e616cfd8aaeae4
SHA1 hash:
b526df575129071d4627dbe0b27f40e525dd0c43
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-05-03 15:16:25 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [C0003.001] Communication Micro-objective::Create Pipe::Interprocess Communication
2) [C0047] File System Micro-objective::Delete File
3) [C0051] File System Micro-objective::Read File
4) [C0052] File System Micro-objective::Writes File
5) [C0007] Memory Micro-objective::Allocate Memory
6) [C0034.001] Operating System Micro-objective::Set Variable::Environment Variable
7) [C0017] Process Micro-objective::Create Process
8) [C0018] Process Micro-objective::Terminate Process