MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 405f7c89ba1cfa0a548c40dff89d003a06d6ad6fa8fa50bcd37f83cfc9bfa431. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Cobalt Strike


Vendor detections: 11


Intelligence 11 IOCs YARA 2 File information Comments

SHA256 hash: 405f7c89ba1cfa0a548c40dff89d003a06d6ad6fa8fa50bcd37f83cfc9bfa431
SHA3-384 hash: ba4d9d0969279079411fe3eaa1f0058a8afdd52a7bb1d85bec4159e7811a6f1bfebc283f8557e3cd417d496ea135e38d
SHA1 hash: d6325814107fd10ba6f63a11ecb5b796553b291b
MD5 hash: 1195ad87cfc060272b60133c613b928e
humanhash: romeo-blue-paris-alaska
File name:ps1004.ps1
Download: download sample
Signature Cobalt Strike
File size:8'584 bytes
First seen:2024-11-19 11:13:53 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 96:zCTRX/T7Dh9pPKZT3Aasj0AwCATxuc23s5GeaWy7V1Xf4ymxtgqkfuaMk09clOm:zaF7Dh/PO3AaI2LxUlC5xtgqkfhMzcOm
TLSH T12802B474CD3CAE82455CB9807B25B94110ED793B4E3CA1BCEE930484B654E5EFB3785A
Magika powershell
Reporter Joker
Tags:Cobalt Strike malware ps1

Intelligence


File Origin
# of uploads :
1
# of downloads :
109
Origin country :
GR GR
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.1%
Tags:
rozena shell virus sage
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive powershell powershell
Verdict:
Malicious
Labled as:
Dropper.Trojan.PwShell.Downloader
Result
Threat name:
n/a
Detection:
malicious
Classification:
expl.evad
Score:
96 / 100
Signature
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Encrypted powershell cmdline option found
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Parameter Substring
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1558351 Sample: ps1004.ps1 Startdate: 19/11/2024 Architecture: WINDOWS Score: 96 36 Malicious sample detected (through community Yara rule) 2->36 38 Antivirus detection for dropped file 2->38 40 Antivirus / Scanner detection for submitted sample 2->40 42 6 other signatures 2->42 10 powershell.exe 11 2->10         started        process3 signatures4 46 Encrypted powershell cmdline option found 10->46 13 powershell.exe 16 10->13         started        16 conhost.exe 10->16         started        process5 signatures6 48 Encrypted powershell cmdline option found 13->48 18 powershell.exe 15 13->18         started        process7 signatures8 44 Encrypted powershell cmdline option found 18->44 21 powershell.exe 22 18->21         started        process9 dnsIp10 34 192.168.18.129, 8080 unknown unknown 21->34 30 C:\Users\user\AppData\...\3wl4oxec.cmdline, Unicode 21->30 dropped 25 csc.exe 3 21->25         started        file11 process12 file13 32 C:\Users\user\AppData\Local\...\3wl4oxec.dll, PE32 25->32 dropped 28 cvtres.exe 1 25->28         started        process14
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2024-11-15 17:49:37 UTC
File Type:
Text (Batch)
AV detection:
20 of 38 (52.63%)
Threat level:
  2/5
Verdict:
malicious
Label(s):
cobaltstrike
Similar samples:
Result
Malware family:
metasploit
Score:
  10/10
Tags:
family:metasploit backdoor discovery execution trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: PowerShell
System Location Discovery: System Language Discovery
MetaSploit
Metasploit family
Malware Config
C2 Extraction:
http://192.168.18.129:8080/UY2jjW-iTdaTLZIs9Bq1pQ1u1z9L8
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:gen_unicorn_obfuscated_powershell
Author:John Lambert @JohnLaTwC
Description:PowerShell payload obfuscated by Unicorn toolkit
Reference:https://github.com/trustedsec/unicorn/
Rule name:SUSP_PS1_JAB_Pattern_Jun22_1
Author:Florian Roth (Nextron Systems)
Description:Detects suspicious UTF16 and Base64 encoded PowerShell code that starts with a $ sign and a single char variable
Reference:Internal Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Cobalt Strike

PowerShell (PS) ps1 405f7c89ba1cfa0a548c40dff89d003a06d6ad6fa8fa50bcd37f83cfc9bfa431

(this sample)

  
Delivery method
Distributed via web download

Comments