MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9122991758a93293f0ec4db1de3a04927f583b08751a553d235d5fdc1b254bd4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 9122991758a93293f0ec4db1de3a04927f583b08751a553d235d5fdc1b254bd4
SHA3-384 hash: 1cd34c93053a6ceb64e5a23f76d951d6af30f4b1e1655ced3083ca1ad0193ddd42d6bc08d1e9b1c5f7be7c93ace6b134
SHA1 hash: f972b34d4c6f5eef0b463891b4bfc0ef75db191c
MD5 hash: 99d14b1da9c6a8aeca28a82918d0e316
humanhash: july-montana-beer-helium
File name:knur.exe
Download: download sample
Signature CobaltStrike
File size:885'760 bytes
First seen:2022-08-21 18:16:12 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 244e3a78ff9349b7446b2bf8a31d71d4 (1 x CobaltStrike)
ssdeep 24576:iJZg2FdWMxqy3fi7QRKMFJIOs36qB0c7hMY:OndW84vcsK42Y
Threatray 1'841 similar samples on MalwareBazaar
TLSH T16515AE57F7B853F1D066C53AC4128B5AE7B1BC614B31C38F52A1A75B1F336A14E2A322
TrID 90.1% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
4.8% (.EXE) Win64 Executable (generic) (10523/12/4)
2.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
0.9% (.EXE) OS/2 Executable (generic) (2029/13)
0.9% (.EXE) Generic Win/DOS Executable (2002/3)
File icon (PE):PE icon
dhash icon 71b119dcce576333 (3'570 x Heodo, 203 x TrickBot, 19 x Gh0stRAT)
Reporter TheDFIRReportX
Tags:CobaltStrike exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
559
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
knur.exe
Verdict:
No threats detected
Analysis date:
2022-08-21 18:16:53 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
DNS request
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
CheckScreenResolution
EvasionQueryPerformanceCounter
EvasionGetTickCount
CheckCmdLine
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
explorer.exe greyware keylogger packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
CobaltStrike
Detection:
malicious
Classification:
troj
Score:
92 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Yara detected CobaltStrike
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.CobaltStrike
Status:
Malicious
First seen:
2022-08-21 18:17:10 UTC
File Type:
PE+ (Exe)
Extracted files:
85
AV detection:
13 of 26 (50.00%)
Threat level:
  5/5
Result
Malware family:
cobaltstrike
Score:
  10/10
Tags:
family:cobaltstrike botnet:0 backdoor trojan
Behaviour
Suspicious use of SetWindowsHookEx
Cobaltstrike
Malware Config
C2 Extraction:
http://josefgur.com:443/jquery-3.3.1.min.js
Unpacked files
SH256 hash:
9122991758a93293f0ec4db1de3a04927f583b08751a553d235d5fdc1b254bd4
MD5 hash:
99d14b1da9c6a8aeca28a82918d0e316
SHA1 hash:
f972b34d4c6f5eef0b463891b4bfc0ef75db191c
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments