MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4f6af6104eb118ee193f1b77124dfcdfbef04af6ae6e55c8e37f2f68e9d526eb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 4f6af6104eb118ee193f1b77124dfcdfbef04af6ae6e55c8e37f2f68e9d526eb
SHA3-384 hash: ffb425853958f36c9c84abb91d07ef48f017f2d9b36cf2e9e6c6a614163480e3971c389ebd53ca3c5d738016f13a341a
SHA1 hash: 18ad055e52757826b292e2e05fc9d15e33ccd4bf
MD5 hash: 860cdd118f68793a680ad4d22c43619a
humanhash: skylark-early-pip-colorado
File name:SecuriteInfo.com.BackDoor.Meterpreter.130.21870.19638
Download: download sample
Signature CobaltStrike
File size:392'696 bytes
First seen:2020-11-12 13:46:23 UTC
Last seen:2024-08-20 14:31:58 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 8c1f4dd8532244aa3dd1729081dcf1fd (1 x CobaltStrike)
ssdeep 6144:F7sx+tIUI5kXgjMuyCezgCabBtrexTtP2pKH6oGsk4yAdLaQ5E:F7sx+tIJ6X/uyCWSLexgcFGV4ZddS
TLSH 3384DF023DE55833CEDF18380158E56E5D28EE314790C9CF6E845DAACFAC6F3D52692A
Reporter SecuriteInfoCom
Tags:CobaltStrike

Code Signing Certificate

Organisation:AI Software a.s.
Issuer:Sectigo RSA Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:Jun 18 00:00:00 2020 GMT
Valid to:Jun 18 23:59:59 2021 GMT
Serial number: 9A8BCFD05F86B15D0C99F50CF414BD00
Intelligence: 2 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 3A50C2F4F19B77E387C84C8D0CE08F2E969608A999D1B43042AC44A976C2B198
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
4
# of downloads :
57
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Launching a process
Running batch commands
DNS request
Creating a file
Sending a custom TCP request
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.CobaltStrike
Status:
Malicious
First seen:
2020-11-12 04:38:11 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
cobaltstrike
Score:
  10/10
Tags:
family:cobaltstrike backdoor trojan
Behaviour
Delays execution with timeout.exe
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Deletes itself
Cobaltstrike
Malware Config
C2 Extraction:
http://oow8Phokeing6kai5haH.glowtrow.online:443/gifs/
http://ooLiey0phuoghei2cei7.cleans.online:443/gifs/
http://eiphaem9aifuR1udaizu.badedsho.space:443/image/
Unpacked files
SH256 hash:
4f6af6104eb118ee193f1b77124dfcdfbef04af6ae6e55c8e37f2f68e9d526eb
MD5 hash:
860cdd118f68793a680ad4d22c43619a
SHA1 hash:
18ad055e52757826b292e2e05fc9d15e33ccd4bf
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CobaltStrike

Executable exe 4f6af6104eb118ee193f1b77124dfcdfbef04af6ae6e55c8e37f2f68e9d526eb

(this sample)

  
Delivery method
Distributed via web download

Comments