MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8bb24503e3418b4e1879c450818a21da05f7f3a54da7939b3f1733b45c9bb029. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments 1

SHA256 hash: 8bb24503e3418b4e1879c450818a21da05f7f3a54da7939b3f1733b45c9bb029
SHA3-384 hash: 949e6be6725c0048889728c60092611f7398c17907221ab100f6e19f56af4b9a2ff9621249025fbbceec4450f82ed6c3
SHA1 hash: 59a1f937d05d6a58f14d54c9ff28e2ee3848341b
MD5 hash: 96d91899cf019ab4c92d256a065caeb6
humanhash: blue-angel-fish-washington
File name:26add9bbf4d107.dll
Download: download sample
Signature CobaltStrike
File size:472'064 bytes
First seen:2020-08-04 11:23:57 UTC
Last seen:2020-08-05 10:13:00 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash fefec65b5b0ea1e47e24a95031f14ce5 (1 x CobaltStrike)
ssdeep 12288:eKJka8ZVIz3uWFgqmLhoO7OYSOoD91i8xC9xuF:JL8ZRZLhD7ZSO291i8xIx
Threatray 70 similar samples on MalwareBazaar
TLSH 3EA4020175C1C472D57E95340570DA724B7FAE71EBD0ACDB2784293A8E342E28F35E6A
Reporter abuse_ch
Tags:CobaltStrike


Avatar
abuse_ch
Cobalt Strike C2s:
authoritative.rogerwlaker.xyz
cloudflare.robertstratton.xyz
managemen.onlinestephanie.xyz
status.jarredlike.xyz

Intelligence


File Origin
# of uploads :
2
# of downloads :
79
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
Machine Learning detection for sample
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 256852 Sample: 26add9bbf4d107.dll Startdate: 04/08/2020 Architecture: WINDOWS Score: 52 25 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->25 27 Machine Learning detection for sample 2->27 8 loaddll32.exe 1 2->8         started        process3 process4 10 cmd.exe 1 8->10         started        12 regsvr32.exe 8->12         started        process5 14 iexplore.exe 11 83 10->14         started        process6 16 iexplore.exe 5 151 14->16         started        dnsIp7 19 edge.gycpi.b.yahoodns.net 87.248.118.22, 443, 49777, 49778 YAHOO-DEBDE United Kingdom 16->19 21 pagead.l.doubleclick.net 172.217.20.2, 443, 49762, 49763 GOOGLEUS United States 16->21 23 19 other IPs or domains 16->23
Threat name:
Win32.Trojan.CobaltStrike
Status:
Malicious
First seen:
2020-08-04 11:25:05 UTC
File Type:
PE (Dll)
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of WriteProcessMemory
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CobaltStrike

DLL dll 8bb24503e3418b4e1879c450818a21da05f7f3a54da7939b3f1733b45c9bb029

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
Rony commented on 2020-08-05 12:01:59 UTC

Also dropped from this maldoc 7888a1c70bc711f34ac921d2c577d938
report: https://tria.ge/200805-7hw74e4f9s/behavioral1