MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 62a1353464b1687476a6d648161e8f9af6c6d26c7ebee0cbb3b0eacb8e5a9fc4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 10


Intelligence 10 IOCs YARA 3 File information Comments

SHA256 hash: 62a1353464b1687476a6d648161e8f9af6c6d26c7ebee0cbb3b0eacb8e5a9fc4
SHA3-384 hash: 87ba4544ef9f0fafa061c3de34e6ad9b144b481153920db56fa4d0f7c37c817e1a0da86483ae2d1e5ca8d5682a41a90e
SHA1 hash: ef4134dce94a6cf9239e41ad5ad9256225fa7fd8
MD5 hash: edb5c2ad1bfd4570b360a68dd8ee9527
humanhash: asparagus-georgia-ink-pasta
File name:cs.exe
Download: download sample
Signature CobaltStrike
File size:226'816 bytes
First seen:2021-09-26 08:29:48 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 829da329ce140d873b4a8bde2cbfaa7e (259 x CobaltStrike)
ssdeep 6144:BO2E3nPjJOl3u5PeWdDB8H4bcIL+OQxJ:o2gjQlEPd98qwd
Threatray 509 similar samples on MalwareBazaar
TLSH T10524E0FC3A4FB331C04E58F25DDA09BA4DAAD67B4EC1BF1258E0E365835B01A1B055AD
Reporter drb_ra
Tags:CobaltStrike

Intelligence


File Origin
# of uploads :
1
# of downloads :
601
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
cobaltstrike_shellcode.exe
Verdict:
No threats detected
Analysis date:
2021-09-26 08:29:47 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
CobaltStrikeBeacon
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Connection attempt
Sending a custom TCP request
Malware family:
CobaltStrike
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
76 / 100
Signature
Antivirus / Scanner detection for submitted sample
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.CobaltStrike
Status:
Malicious
First seen:
2021-09-26 08:30:08 UTC
AV detection:
38 of 45 (84.44%)
Threat level:
  5/5
Result
Malware family:
cobaltstrike
Score:
  10/10
Tags:
family:cobaltstrike botnet:1580103824 backdoor trojan
Behaviour
Cobaltstrike
Malware Config
C2 Extraction:
http://wsus-link.global.ssl.fastly.net:443/Arrange/v4.12/1GJUQQEHI2
Unpacked files
SH256 hash:
3a936736cfcee7e8baa130b1c86928e61b08b8eab28dcb831e906a4f3e31cfb7
MD5 hash:
86c143b7d1e9dd7575f2b5316da35493
SHA1 hash:
68f75ebb5499ba9a711560de1965a7c7e1599d57
SH256 hash:
62a1353464b1687476a6d648161e8f9af6c6d26c7ebee0cbb3b0eacb8e5a9fc4
MD5 hash:
edb5c2ad1bfd4570b360a68dd8ee9527
SHA1 hash:
ef4134dce94a6cf9239e41ad5ad9256225fa7fd8
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Cobaltbaltstrike_strike_Payload_XORed
Author:Avast Threat Intel Team
Description:Detects CobaltStrike payloads
Reference:https://github.com/avast/ioc
Rule name:HKTL_Unlicensed_CobaltStrike_EICAR_Jul18_5
Author:Florian Roth
Description:Detects strings found in CobaltStrike shellcode
Reference:https://researchcenter.paloaltonetworks.com/2018/07/unit42-new-threat-actor-group-darkhydrus-targets-middle-east-government/
Rule name:HKTL_Unlicensed_CobaltStrike_EICAR_Jul18_5_RID361D
Author:Florian Roth
Description:Detects strings found in malware samples in APT report in DarkHydrus
Reference:https://researchcenter.paloaltonetworks.com/2018/07/unit42-new-threat-actor-group-darkhydrus-targets-middle-east-government/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments