MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 836db6bde6f664fa42b020c7b4549713022eac87410c1ed1104b6d4df615a599. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 836db6bde6f664fa42b020c7b4549713022eac87410c1ed1104b6d4df615a599
SHA3-384 hash: 6b1b39f58fc7608b2c45d1a7668d3c01a8ae100648e5dc2dc4c0c68d800df5264d0d2c1072258c97d5c98dff14556e2d
SHA1 hash: dd77cee3d418a6462b2e31fabc76510b8f2320d5
MD5 hash: 45ed8898bead32070cf1eb25640b414c
humanhash: johnny-kilo-maryland-one
File name:836db6bde6f664fa42b020c7b4549713022eac87410c1ed1104b6d4df615a599
Download: download sample
Signature CobaltStrike
File size:677'344 bytes
First seen:2020-10-21 13:23:18 UTC
Last seen:2020-10-21 14:05:15 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 102983d1d06c7d80b040d45e9425a96f (1 x CobaltStrike)
ssdeep 6144:dG+hzs3xTAC9Qw2bZV0dHRH2HzHoHdHyHK:dG+ABAC9QqxWTI9Sq
Threatray 621 similar samples on MalwareBazaar
TLSH F8E49352719AC6A8C0774370416D877EEF92A4D20E22F1FFE51E6678C96B09FB4343A4
Reporter JAMESWT_WT
Tags:CobaltStrike TES LOGISTIKA d.o.o.

Code Signing Certificate

Organisation:DigiCert High Assurance EV Root CA
Issuer:DigiCert High Assurance EV Root CA
Algorithm:sha1WithRSAEncryption
Valid from:Nov 10 00:00:00 2006 GMT
Valid to:Nov 10 00:00:00 2031 GMT
Serial number: 02AC5C266A0B409B8F0B79F2AE462577
Intelligence: 204 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 7431E5F4C3C1CE4690774F0B61E05440883BA9A01ED00BA6ABD7806ED3B118CF
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
3
# of downloads :
85
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
DNS request
Sending a custom TCP request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
A
b
c
d
e
f
i
l
M
n
o
r
S
t
u
V
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.Shelma
Status:
Malicious
First seen:
2020-10-21 02:56:10 UTC
File Type:
PE+ (Exe)
Extracted files:
15
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
cobaltstrike
Score:
  10/10
Tags:
trojan backdoor family:cobaltstrike
Behaviour
Cobaltstrike
Malware Config
C2 Extraction:
http://tr.topbackupintheworld.com:443/admin
http://gf.topbackupintheworld.com:443/admin
http://bv.topbackupintheworld.com:443/admin
Unpacked files
SH256 hash:
836db6bde6f664fa42b020c7b4549713022eac87410c1ed1104b6d4df615a599
MD5 hash:
45ed8898bead32070cf1eb25640b414c
SHA1 hash:
dd77cee3d418a6462b2e31fabc76510b8f2320d5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments