MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 42104ac31fe7ae7328c209007ea71dc3effb183c736a9bddcf86f690fe96df9a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 42104ac31fe7ae7328c209007ea71dc3effb183c736a9bddcf86f690fe96df9a
SHA3-384 hash: dfcdbe56aef17b58bb041ea10c21d0922e24809d0060c54586f4706f3a803b4e2fec67a97d1e60b12ebd12e32de80c2b
SHA1 hash: 2aa0c824bddb85e60ec25724ebb5509e1f52785a
MD5 hash: 8cd1fa5b99da42265103d9da22f46666
humanhash: zebra-two-kansas-alanine
File name:42104ac31fe7ae7328c209007ea71dc3effb183c736a9bddcf86f690fe96df9a.bin
Download: download sample
Signature CobaltStrike
File size:288'256 bytes
First seen:2021-07-29 07:47:49 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 17b461a082950fc6332228572138b80c (121 x CobaltStrike, 2 x Cobalt Strike)
ssdeep 6144:YCEqt32bK29/inSYUTvKj51JVEhzTFuKy:Uqh6KYYUTkIHF
Threatray 1'061 similar samples on MalwareBazaar
TLSH T17254AE28A3B941BAC3DECE71ABBE275346E46CAD7D75BD3D4904B96B3F400D58608C06
Reporter JAMESWT_WT
Tags:assets.switzer.com.au.global.prod.fastly.net CobaltStrike exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
146
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
42104ac31fe7ae7328c209007ea71dc3effb183c736a9bddcf86f690fe96df9a.bin
Verdict:
No threats detected
Analysis date:
2021-07-29 07:58:08 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
CobaltStrikeBeacon
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
CobaltStrike
Verdict:
Malicious
Result
Threat name:
CobaltStrike
Detection:
malicious
Classification:
troj
Score:
84 / 100
Signature
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected CobaltStrike
Behaviour
Behavior Graph:
Gathering data
Threat name:
Win64.Trojan.CobaltStrike
Status:
Malicious
First seen:
2021-07-27 02:53:53 UTC
File Type:
PE+ (Exe)
AV detection:
38 of 46 (82.61%)
Threat level:
  5/5
Result
Malware family:
cobaltstrike
Score:
  10/10
Tags:
family:cobaltstrike botnet:928055683 backdoor trojan
Behaviour
Cobaltstrike
Malware Config
C2 Extraction:
http://assets.switzer.com.au.global.prod.fastly.net:443/jquery-3.3.1.min.js
Unpacked files
SH256 hash:
42104ac31fe7ae7328c209007ea71dc3effb183c736a9bddcf86f690fe96df9a
MD5 hash:
8cd1fa5b99da42265103d9da22f46666
SHA1 hash:
2aa0c824bddb85e60ec25724ebb5509e1f52785a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments