MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4d4d70e1918494a0a39641bd8dbfc23ae6451f3d20396b43f150623b8cfe4e93. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 6


Intelligence 6 IOCs YARA 27 File information Comments

SHA256 hash: 4d4d70e1918494a0a39641bd8dbfc23ae6451f3d20396b43f150623b8cfe4e93
SHA3-384 hash: 42ba8b3e0e778560ac9fad5008a41f1b41d9174dd17d6acfe8a132ce6d70b20480495b7f7f88be5e1151f4dbbf0212d0
SHA1 hash: c50a153458e3f8a83ace7f195605bb481d286f6e
MD5 hash: c339f9930b7a5d8172acf898f6270632
humanhash: pizza-alaska-pizza-grey
File name:1234.hta
Download: download sample
Signature CobaltStrike
File size:293'500 bytes
First seen:2022-01-15 09:56:44 UTC
Last seen:Never
File type:HTML Application (hta) hta
MIME type:text/html
ssdeep 6144:uGser0A9gxLIanBrj5ysuKoAHMVIYSRjIaMMUY726AbpPjj5EZKO/ltwEDHHkqFM:4er9OEUBUBaHMVIDOMUyrSP5O4EzHkmM
TLSH T1FF54B03B9433FDE6BA7D198D900C3C031D682AC74614625CEA8D546A76C9937ADFCCB8
Reporter r3dbU7z
Tags:CobaltStrike exe hta

Intelligence


File Origin
# of uploads :
1
# of downloads :
753
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malicious
File Type:
HTA File - Malicious
Payload URLs
URL
File name
http://127.0.0.1
HTA File
Result
Verdict:
MALICIOUS
Details
Base64 Encoded Powershell Directives
Detected one or more base64 encoded Powershell directives.
Base64 Encoded URL
Detected an ANSI or UNICODE http:// or https:// base64 encoded URL prefix.
Threat name:
Script-WScript.Trojan.CobaltStrikeBeacon
Status:
Malicious
First seen:
2022-01-15 09:57:19 UTC
File Type:
Text (HTML)
Extracted files:
1
AV detection:
16 of 28 (57.14%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Base64_Encoded_Powershell_Directives
Rule name:Beacon_K5om
Author:Florian Roth
Description:Detects Meterpreter Beacon - file K5om.dll
Reference:https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html
Rule name:Beacon_K5om_RID2B14
Author:Florian Roth
Description:Detects Meterpreter Beacon - file K5om.dll
Reference:https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html
Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:CACTUSTORCH
Author:Florian Roth
Description:Detects CactusTorch Hacktool
Reference:https://github.com/mdsecactivebreach/CACTUSTORCH
Rule name:CACTUSTORCH_RID2A54
Author:Florian Roth
Description:Detects CactusTorch Hacktool
Reference:https://github.com/mdsecactivebreach/CACTUSTORCH_RID2A54
Rule name:Cobaltbaltstrike_Beacon_Encoded
Author:Avast Threat Intel Team
Description:Detects CobaltStrike payloads
Reference:https://github.com/avast/ioc
Rule name:Cobaltbaltstrike_Beacon_x86
Author:Avast Threat Intel Team
Description:Detects CobaltStrike payloads
Reference:https://github.com/avast/ioc
Rule name:CobaltStrikeBeacon
Author:ditekshen, enzo & Elastic
Description:Cobalt Strike Beacon Payload
Rule name:CobaltStrike_C2_Encoded_XOR_Config_Indicator
Author:yara@s3c.za.net
Description:Detects CobaltStrike C2 encoded profile configuration
Rule name:CobaltStrike_ReflectiveLoader_RID3297
Author:Florian Roth
Description:Detects reflective loader (Cobalt Strike)
Reference:http://www.clearskysec.com/tulip
Rule name:CobaltStrike_Unmodifed_Beacon
Author:yara@s3c.za.net
Description:Detects unmodified CobaltStrike beacon DLL
Rule name:crime_win32_csbeacon_1
Author:@VK_Intel
Description:Detects Cobalt Strike loader
Reference:https://twitter.com/VK_Intel/status/1239632822358474753
Rule name:CS_beacon
Author:Etienne Maynier tek@randhome.io
Rule name:HKTL_CobaltStrike_Beacon_Strings
Author:Elastic
Description:Identifies strings used in Cobalt Strike Beacon DLL
Reference:https://www.elastic.co/blog/detecting-cobalt-strike-with-memory-signatures
Rule name:HKTL_Meterpreter_inMemory
Author:netbiosX, Florian Roth
Description:Detects Meterpreter in-memory
Reference:https://www.reddit.com/r/purpleteamsec/comments/hjux11/meterpreter_memory_indicators_detection_tooling/
Rule name:HKTL_Win_CobaltStrike
Author:threatintel@volexity.com
Description:The CobaltStrike malware family.
Reference:https://www.volexity.com/blog/2021/05/27/suspected-apt29-operation-launches-election-fraud-themed-phishing-campaigns/
Rule name:INDICATOR_SUSPICIOUS_ReflectiveLoader
Author:ditekSHen
Description:detects Reflective DLL injection artifacts
Rule name:Leviathan_CobaltStrike_Sample_1
Author:Florian Roth
Description:Detects Cobalt Strike sample from Leviathan report
Reference:https://goo.gl/MZ7dRg
Rule name:Leviathan_CobaltStrike_Sample_1_RID3324
Author:Florian Roth
Description:Detects Cobalt Strike sample from Leviathan report
Reference:https://goo.gl/MZ7dRg
Rule name:Malware_QA_vqgk
Author:Florian Roth
Description:VT Research QA uploaded malware - file vqgk.dll
Reference:VT Research QA
Rule name:MALWARE_Win_CobaltStrike
Author:ditekSHen
Description:CobaltStrike payload
Rule name:PowerShell_Susp_Parameter_Combo
Author:Florian Roth
Description:Detects PowerShell invocation with suspicious parameters
Reference:https://goo.gl/uAic1X
Rule name:PowerShell_Susp_Parameter_Combo_RID336F
Author:Florian Roth
Description:Detects PowerShell invocation with suspicious parameters
Reference:https://goo.gl/uAic1X
Rule name:ReflectiveLoader
Author:Florian Roth
Description:Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended
Reference:Internal Research
Rule name:WiltedTulip_ReflectiveLoader
Author:Florian Roth
Description:Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip
Reference:http://www.clearskysec.com/tulip
Rule name:XOREngine_Misc_XOR_Func
Author:smiller cc @florian @wesley idea on implementation with yara's built in XOR function
Description:Use with care, https://twitter.com/cyb3rops/status/1237042104406355968

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CobaltStrike

HTML Application (hta) hta 4d4d70e1918494a0a39641bd8dbfc23ae6451f3d20396b43f150623b8cfe4e93

(this sample)

  
Delivery method
Distributed via web download

Comments