MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 78102fea526965cba6d040994d64370115dbfcb697cff1e19bb34bd94c1e9b5e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 78102fea526965cba6d040994d64370115dbfcb697cff1e19bb34bd94c1e9b5e
SHA3-384 hash: ec836b4d8f1756d29f7608d31e86ac0d048941e4967031e0553d7aecb299c3b1d98157b218ed945a23d06acde335205e
SHA1 hash: ebdb49d86714bde4757810b706324a7ee7e643b7
MD5 hash: 9ca10c814be1bb4828a3799d886bb359
humanhash: east-pizza-social-crazy
File name:ki71miudi.dll
Download: download sample
Signature CobaltStrike
File size:1'975'296 bytes
First seen:2022-02-10 13:46:39 UTC
Last seen:2022-02-10 15:29:54 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash 42bf85e27a2aceee011d78c18571bd15 (1 x CobaltStrike)
ssdeep 24576:oC4f9YuSiD1YeLDxpUqD4Q6CkYIAVWf7omrvVTX+abRbW1waSSEjxkvwfBdCGefl:AtD3sqDNk3kWbLN3KF28iQS1bXsnB
Threatray 10'251 similar samples on MalwareBazaar
TLSH T1B69502C6DBEFC1F2ED4E207400232B6B4FB6AA05445ACE15FEC95D716A27321662F394
Reporter JAMESWT_WT
Tags:CobaltStrike dll

Intelligence


File Origin
# of uploads :
2
# of downloads :
513
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
DNS request
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
CobaltStrike
Detection:
malicious
Classification:
troj
Score:
72 / 100
Signature
C2 URLs / IPs found in malware configuration
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: Suspicious Call by Ordinal
Yara detected CobaltStrike
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 570118 Sample: ki71miudi.dll Startdate: 10/02/2022 Architecture: WINDOWS Score: 72 17 Found malware configuration 2->17 19 Malicious sample detected (through community Yara rule) 2->19 21 Yara detected CobaltStrike 2->21 23 2 other signatures 2->23 7 loaddll32.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 rundll32.exe 7->11         started        13 rundll32.exe 7->13         started        process5 15 rundll32.exe 9->15         started       
Threat name:
Win32.Trojan.CobaltStrikeBeacon
Status:
Malicious
First seen:
2021-11-19 00:19:39 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
12 of 28 (42.86%)
Threat level:
  5/5
Result
Malware family:
cobaltstrike
Score:
  10/10
Tags:
family:cobaltstrike botnet:427756752 backdoor trojan
Behaviour
Checks processor information in registry
Modifies data under HKEY_USERS
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Cobaltstrike
Malware Config
C2 Extraction:
http://d1rfequ2jtua4r.cloudfront.net:443/safebrowsing/sTTaQ8/c2k-gTyJa8gj38g2gVSjrM
http://d1mdflz12t12gs.cloudfront.net:443/safebrowsing/sTTaQ8/c2k-gTyJa8gj38g2gVSjrM
Unpacked files
SH256 hash:
78102fea526965cba6d040994d64370115dbfcb697cff1e19bb34bd94c1e9b5e
MD5 hash:
9ca10c814be1bb4828a3799d886bb359
SHA1 hash:
ebdb49d86714bde4757810b706324a7ee7e643b7
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments