MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5d788fe9005c1db5c67e38ec338c023856c8d71f20e137020fbc292e216d3997. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 5d788fe9005c1db5c67e38ec338c023856c8d71f20e137020fbc292e216d3997
SHA3-384 hash: a2683499c123f77339b1a6edb45ac214258e559632f56d88ebd2254763fa13f97813b23a2e93dd3a076732b6fa6d98ef
SHA1 hash: 76eccc09ca37441e3f2b85e1bdeedaf33d434f1e
MD5 hash: 40e85653abe687ddfd95b67a5f5dd452
humanhash: quiet-utah-ohio-green
File name:40e85653abe687ddfd95b67a5f5dd452.exe
Download: download sample
Signature CobaltStrike
File size:412'672 bytes
First seen:2020-11-12 10:44:54 UTC
Last seen:2024-07-24 14:53:04 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 1010adeb7e25af89f86d7ebe811de0b0 (2 x CobaltStrike)
ssdeep 6144:N3/43tD3eFaTvdUNAG7m+0/e8mB0QpfdXe3Z7TzQ/XfZ46eqmCMh:5/67eKv66ImN/er0QlinQXfZlTa
Threatray 637 similar samples on MalwareBazaar
TLSH 6994AE43E2F1F0EDF01182718C6C4B42FBA3673457A2D6A696E786691E67DB0DC5CB20
Reporter abuse_ch
Tags:CobaltStrike exe

Intelligence


File Origin
# of uploads :
4
# of downloads :
100
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Running batch commands
DNS request
Creating a file
Sending a custom TCP request
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
CobaltStrike
Detection:
malicious
Classification:
troj.evad
Score:
72 / 100
Signature
Allocates memory in foreign processes
Contains functionality to inject code into remote processes
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Writes to foreign memory regions
Yara detected CobaltStrike
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.CobaltStrike
Status:
Malicious
First seen:
2020-11-03 14:19:55 UTC
File Type:
PE+ (Exe)
Extracted files:
1
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
cobaltstrike
Score:
  10/10
Tags:
family:cobaltstrike backdoor trojan
Behaviour
Delays execution with timeout.exe
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Deletes itself
Cobaltstrike
Malware Config
C2 Extraction:
http://Uw0soheevahjahsaifae.glowtrow.fun:443/image/
http://bah1tuquaizia9eu3Ume.glowtrow.site:443/created/
http://seudaize6io3Go0quahC.cleans.space:443/static/
Unpacked files
SH256 hash:
5d788fe9005c1db5c67e38ec338c023856c8d71f20e137020fbc292e216d3997
MD5 hash:
40e85653abe687ddfd95b67a5f5dd452
SHA1 hash:
76eccc09ca37441e3f2b85e1bdeedaf33d434f1e
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CobaltStrike

Executable exe 5d788fe9005c1db5c67e38ec338c023856c8d71f20e137020fbc292e216d3997

(this sample)

  
Delivery method
Distributed via web download

Comments