MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 79af3ed8a0c8344fb0bd82dd41e2cc753cf2f9c8825f333348ca2bebf1ede032. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 79af3ed8a0c8344fb0bd82dd41e2cc753cf2f9c8825f333348ca2bebf1ede032
SHA3-384 hash: 8b10bdf52894674b6c7ff227f04541393d623c128c1abd719dfa69e521b35c4a6dfd40d0fa46e5ff528030685bd26c50
SHA1 hash: d6512b86eb8d573a6b225337074056eac4baefdf
MD5 hash: 9477aaddb12987f5640e72be0f753d1e
humanhash: cat-fix-carpet-mirror
File name:79af3ed8a0c8344fb0bd82dd41e2cc753cf2f9c8825f333348ca2bebf1ede032.bin
Download: download sample
Signature CobaltStrike
File size:291'992 bytes
First seen:2021-05-31 11:19:36 UTC
Last seen:2021-05-31 12:16:25 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 3d00a5aa14ca9bec3e1ea153cbdef791 (4 x CobaltStrike)
ssdeep 3072:16s6+7I8ItvWmwnCHrIaRKq874B/4e19i+UJcZDn57e7gYJA7JYt2o8dpy8wF3he:E+v8v3wbPt21Pi+UJy57eV272hLpUIQv
Threatray 5 similar samples on MalwareBazaar
TLSH 5654BF9AFC3972AEFE61817D41914032225FDC3C041139079BD5E7A72C8974A1BEFADA
Reporter JAMESWT_WT
Tags:1.A Connect GmbH CobaltStrike exe

Code Signing Certificate

Organisation:1.A Connect GmbH
Issuer:COMODO RSA Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:2018-08-13T00:00:00Z
Valid to:2022-08-13T23:59:59Z
Serial number: a7e4ded4bf949d15aa4201843f1ab64d
Intelligence: 30 malware samples on MalwareBazaar are signed with this code signing certificate
MalwareBazaar Blocklist:This certificate is on the MalwareBazaar code signing certificate blocklist (CSCB)
Thumbprint Algorithm:SHA256
Thumbprint: d519622e7d1eab2c240860d38779704319f1349cc57ab8c3d51d9f56145b582f
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
190
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
79af3ed8a0c8344fb0bd82dd41e2cc753cf2f9c8825f333348ca2bebf1ede032.bin
Verdict:
No threats detected
Analysis date:
2021-05-31 11:27:46 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
CobaltStrikeBeacon
Result
Verdict:
Clean
Maliciousness:

Behaviour
Connection attempt
Sending a UDP request
Launching the default Windows debugger (dwwin.exe)
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
CobaltStrike
Detection:
malicious
Classification:
troj
Score:
84 / 100
Signature
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected CobaltStrike
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.CobaltStrike
Status:
Malicious
First seen:
2021-04-13 21:56:07 UTC
File Type:
PE+ (Exe)
AV detection:
24 of 45 (53.33%)
Threat level:
  5/5
Result
Malware family:
cobaltstrike
Score:
  10/10
Tags:
family:cobaltstrike botnet:1359593325 backdoor trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Cobaltstrike
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments