MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 40ab463703114d972269c34abeecf0f796c88c20cceaaf0e582ed0a132e556fa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 40ab463703114d972269c34abeecf0f796c88c20cceaaf0e582ed0a132e556fa
SHA3-384 hash: 6a612f24e348be076f611e102cbf9ee6626339c998bae526918bf8f12a3ba4b5fe0f261958f710ee4b49157d1002ce93
SHA1 hash: 4bf7ed198da315016f0759dee4c5705f1cd465f0
MD5 hash: 1cb5a9c2bc4adfe101f6069d525ba9b2
humanhash: gee-nebraska-lake-london
File name:aloy64.exe
Download: download sample
Signature CobaltStrike
File size:396'288 bytes
First seen:2022-12-08 19:10:44 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a35f121ed76d9b1e75ce64250798b7ea (1 x CobaltStrike)
ssdeep 6144:fduncjk3xxCY3Z57rsM/f+xpnW3IpULzArfC43Qp951nHhZW4oI29NyA6xUjqQ43:f1jkRLsGGxpnWjL8G4qot9NGxUjqQ4L
TLSH T19E84CF15F2910DDBCCA7863D4862021ABB313C560726CFBBA290C73A3E577D59E76B21
TrID 48.7% (.EXE) Win64 Executable (generic) (10523/12/4)
23.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.3% (.EXE) OS/2 Executable (generic) (2029/13)
9.2% (.EXE) Generic Win/DOS Executable (2002/3)
9.2% (.EXE) DOS Executable Generic (2000/1)
Reporter malware_traffic
Tags:64bit Beacon Cobalt Strike CobaltStrike exe


Avatar
malware_traffic
Seen as follow-up malware after an IcedID infection on 2022-12-08

Intelligence


File Origin
# of uploads :
1
# of downloads :
295
Origin country :
US US
Vendor Threat Intelligence
Detection:
CobaltStrikeBeacon
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Cobalt Strike
Verdict:
Malicious
Result
Threat name:
CobaltStrike
Detection:
malicious
Classification:
troj
Score:
96 / 100
Signature
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected CobaltStrike
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.CobaltStrike
Status:
Malicious
First seen:
2022-12-08 20:06:48 UTC
AV detection:
15 of 26 (57.69%)
Threat level:
  5/5
Result
Malware family:
cobaltstrike
Score:
  10/10
Tags:
family:cobaltstrike botnet:0 botnet:666 backdoor trojan
Behaviour
Modifies system certificate store
Cobaltstrike
Malware Config
C2 Extraction:
http://aloyadakmashin.com:443/wp-content/chunky/
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
40ab463703114d972269c34abeecf0f796c88c20cceaaf0e582ed0a132e556fa
MD5 hash:
1cb5a9c2bc4adfe101f6069d525ba9b2
SHA1 hash:
4bf7ed198da315016f0759dee4c5705f1cd465f0
Malware family:
CobaltStrike
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments