MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 662688d36dc7b035a0dc23d09d5d4c25fa70408373266f72c6d03d3187adbfd5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 662688d36dc7b035a0dc23d09d5d4c25fa70408373266f72c6d03d3187adbfd5
SHA3-384 hash: b83093447e2490dd94097a36aa7af62e1bb86941a0d090fb8bc9662ef1aad86dfa69db587376576f5909e934987e37bb
SHA1 hash: 2b7e4346b637121c987c0326fa03e98f8aaaf555
MD5 hash: b9d0f534095b57cf2f6f54cd671281d3
humanhash: don-chicken-alabama-harry
File name:662688d36dc7b035a0dc23d09d5d4c25fa70408373266f72c6d03d3187adbfd5
Download: download sample
Signature CobaltStrike
File size:24'520 bytes
First seen:2021-02-15 17:18:10 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash dc25ee78e2ef4d36faa0badf1e7461c9 (118 x CobaltStrike, 5 x Cobalt Strike)
ssdeep 384:yCxRKqbOCdWIVBPk+xzyFfCXAnz5eDZ/d5GBQlJRrMK6jr1:yCxTRVJknfiAd6GrKgZ
Threatray 109 similar samples on MalwareBazaar
TLSH EFB22BB6DB862CA5FE678F3030F9A77BAE33F2135C258C8ADD40C4401A62691981576E
Reporter JAMESWT_WT
Tags:CobaltStrike CobaltStrike beacon implant Zoom Meetings signed

Code Signing Certificate

Organisation:Zoom Video Communications, Inc.
Issuer:Go Daddy Secure Certificate Authority - G2
Algorithm:sha256WithRSAEncryption
Valid from:2017-01-20T20:02:01Z
Valid to:2020-01-20T02:33:38Z
Serial number: 25827a1b362bae36
Intelligence: 2 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 2b0f937bad5fc9510cd1d8ad11d1056b78857e165f91ca9262d1b7eca9314f35
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
493
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
662688d36dc7b035a0dc23d09d5d4c25fa70408373266f72c6d03d3187adbfd5
Verdict:
No threats detected
Analysis date:
2021-02-15 17:23:35 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Connection attempt
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
52 / 100
Signature
Found potential dummy code loops (likely to delay analysis)
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.CobaltStrike
Status:
Malicious
First seen:
2020-12-07 20:47:00 UTC
File Type:
PE (Exe)
AV detection:
23 of 28 (82.14%)
Threat level:
  5/5
Result
Malware family:
metasploit
Score:
  10/10
Tags:
family:metasploit backdoor trojan
Behaviour
MetaSploit
Malware Config
C2 Extraction:
http://47.95.205.52:10086/sk9E
Unpacked files
SH256 hash:
662688d36dc7b035a0dc23d09d5d4c25fa70408373266f72c6d03d3187adbfd5
MD5 hash:
b9d0f534095b57cf2f6f54cd671281d3
SHA1 hash:
2b7e4346b637121c987c0326fa03e98f8aaaf555
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments