MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7d44007cdcfe063f3c1d38e29764e1b14ab2bbcea4cd90db04bdc8fa0c86b9aa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 7d44007cdcfe063f3c1d38e29764e1b14ab2bbcea4cd90db04bdc8fa0c86b9aa
SHA3-384 hash: cfa582ce513a1c23bd712ec75eb9daa8c9ff3927548075b53ce533c5474394c7e258626447e9d5cf589f88957630de27
SHA1 hash: c3c9f600f324677e1fb8c6def23ed386410fc2e7
MD5 hash: 0376043d90878be180e095a59ba761f5
humanhash: hot-hamper-pip-batman
File name:7d44007cdcfe063f3c1d38e29764e1b14ab2bbcea4cd90db04bdc8fa0c86b9aa.bin
Download: download sample
Signature CobaltStrike
File size:291'992 bytes
First seen:2021-05-31 11:20:04 UTC
Last seen:2021-05-31 12:16:49 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 3d00a5aa14ca9bec3e1ea153cbdef791 (4 x CobaltStrike)
ssdeep 6144:2pmB967HVFFpKq48mzwMBT951uzWMzRxU+p+:J9671TpKV1BluzWMzRb0
Threatray 4 similar samples on MalwareBazaar
TLSH 0554AEF2C2BD21F5DCDA27792B185D72FD04E91197BB08D9AD93B82060C116A35D8DBC
Reporter JAMESWT_WT
Tags:1.A Connect GmbH CobaltStrike exe

Code Signing Certificate

Organisation:1.A Connect GmbH
Issuer:COMODO RSA Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:2018-08-13T00:00:00Z
Valid to:2022-08-13T23:59:59Z
Serial number: a7e4ded4bf949d15aa4201843f1ab64d
Intelligence: 30 malware samples on MalwareBazaar are signed with this code signing certificate
MalwareBazaar Blocklist:This certificate is on the MalwareBazaar code signing certificate blocklist (CSCB)
Thumbprint Algorithm:SHA256
Thumbprint: d519622e7d1eab2c240860d38779704319f1349cc57ab8c3d51d9f56145b582f
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
205
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
7d44007cdcfe063f3c1d38e29764e1b14ab2bbcea4cd90db04bdc8fa0c86b9aa.bin
Verdict:
No threats detected
Analysis date:
2021-05-31 11:32:47 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
CobaltStrikeBeacon
Result
Verdict:
Clean
Maliciousness:

Behaviour
Connection attempt
Sending a UDP request
Launching the default Windows debugger (dwwin.exe)
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
CobaltStrike
Detection:
malicious
Classification:
troj
Score:
84 / 100
Signature
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected CobaltStrike
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.CobaltStrike
Status:
Malicious
First seen:
2021-04-20 10:26:31 UTC
File Type:
PE+ (Exe)
AV detection:
26 of 45 (57.78%)
Threat level:
  5/5
Result
Malware family:
cobaltstrike
Score:
  10/10
Tags:
family:cobaltstrike botnet:1359593325 backdoor trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Cobaltstrike
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments