MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 61843389da67e196f0ac81507be872b2b932773e03b133dee0fe1613a6784a6b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 61843389da67e196f0ac81507be872b2b932773e03b133dee0fe1613a6784a6b
SHA3-384 hash: 7fec316f58067ed0cef0c064f230db9a1d711b975f79deed87c226e8401e7a0eb5ca9a1bfeef6a1d0d907d062215b004
SHA1 hash: c25ca7fe1075e8b608be91e4e17f365d55fa91a2
MD5 hash: 489d4285755f75f66da50e4be3bd42d6
humanhash: muppet-thirteen-nitrogen-two
File name:489d4285755f75f66da50e4be3bd42d6
Download: download sample
Signature CobaltStrike
File size:204'288 bytes
First seen:2020-10-25 08:09:09 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash e66a62b251fcfbbc930b074503d08542 (24 x CobaltStrike)
ssdeep 3072:HNEfMCK7JqusgLiKG5TnN7FgkQB7R80kUzRe5R1:SfM5dS/JBN7jiR80Ve
Threatray 138 similar samples on MalwareBazaar
TLSH 97148CA53184D032D45B0434674BC77E5E7CBDF016A1A987BFC81E599E716A3EB2A303
Reporter seifreed

Intelligence


File Origin
# of uploads :
1
# of downloads :
82
Origin country :
n/a
Vendor Threat Intelligence
Detection:
CobaltStrikeBeacon
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
68 / 100
Signature
Antivirus / Scanner detection for submitted sample
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 303822 Sample: dHEsCX0216 Startdate: 25/10/2020 Architecture: WINDOWS Score: 68 15 Malicious sample detected (through community Yara rule) 2->15 17 Antivirus / Scanner detection for submitted sample 2->17 19 Multi AV Scanner detection for submitted file 2->19 21 Machine Learning detection for sample 2->21 7 loaddll32.exe 1 2->7         started        process3 process4 9 rundll32.exe 7->9         started        11 rundll32.exe 7->11         started        process5 13 WerFault.exe 23 9 9->13         started       
Threat name:
Win32.PUA.CobaltStrikeBeacon
Status:
Malicious
First seen:
2018-09-28 23:58:11 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
30 of 31 (96.77%)
Threat level:
  1/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
ServiceHost packer
Malware Config
C2 Extraction:
http://62.192.240.250:80/cx
Unpacked files
SH256 hash:
61843389da67e196f0ac81507be872b2b932773e03b133dee0fe1613a6784a6b
MD5 hash:
489d4285755f75f66da50e4be3bd42d6
SHA1 hash:
c25ca7fe1075e8b608be91e4e17f365d55fa91a2
Detections:
win_cobalt_strike_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments