MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7c8621cc3827c1ffbd39ebc8b24e430e2e6aa5bd7b148edc110be9b2914799dc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 7c8621cc3827c1ffbd39ebc8b24e430e2e6aa5bd7b148edc110be9b2914799dc
SHA3-384 hash: 902bcfd08f70f04395fdaf1f2f6bc094c11cf2e5d09f07fa8edeecba8568bfa70b98fec55d308f7c6ffb516b11ed42ee
SHA1 hash: d8113a0f0151254616e08bd84683a76fefaeddec
MD5 hash: f73c7c5491733bbf72e84a3eec778875
humanhash: early-black-idaho-spring
File name:fooler.exe
Download: download sample
Signature CobaltStrike
File size:3'055'616 bytes
First seen:2022-11-12 04:34:09 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a83a3abb3c24430abc10e29619fc8a0c (1 x CobaltStrike)
ssdeep 49152:Dgb1V8K/33adBUE9cYsZx1MvxSJG0nnkU2ge2PWDH8Cc+zD:D383sUMsJGqkU2glWDZc+zD
Threatray 2'075 similar samples on MalwareBazaar
TLSH T1CBE58DA0D8195BD4FCE491F507B6A34126133A71E813379EC1BC6AE0461496F3BAE4FE
TrID 63.5% (.EXE) Win64 Executable (generic) (10523/12/4)
12.2% (.EXE) OS/2 Executable (generic) (2029/13)
12.0% (.EXE) Generic Win/DOS Executable (2002/3)
12.0% (.EXE) DOS Executable Generic (2000/1)
Reporter dor0n
Tags:CobaltStrike exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
225
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
fooler.exe
Verdict:
No threats detected
Analysis date:
2022-11-12 03:29:36 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
explorer.exe greyware packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
CobaltStrike
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
C2 URLs / IPs found in malware configuration
Early bird code injection technique detected
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Queues an APC in another process (thread injection)
Yara detected CobaltStrike
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.CobaltStrike
Status:
Malicious
First seen:
2022-11-12 04:35:10 UTC
File Type:
PE+ (Exe)
AV detection:
10 of 26 (38.46%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of WriteProcessMemory
Suspicious use of NtCreateUserProcessOtherParentProcess
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
7c8621cc3827c1ffbd39ebc8b24e430e2e6aa5bd7b148edc110be9b2914799dc
MD5 hash:
f73c7c5491733bbf72e84a3eec778875
SHA1 hash:
d8113a0f0151254616e08bd84683a76fefaeddec
Malware family:
CobaltStrike
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments