MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 92b093b1547bc3437f4a56d5fc3e72fca3cff6a61403b43125e47896719786ad. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 92b093b1547bc3437f4a56d5fc3e72fca3cff6a61403b43125e47896719786ad
SHA3-384 hash: 25a2e719a048bd71484b7592bf0031e489b24b8b9c3a5d62dfd4f8c5831a66f70402a9f8a31f273f6f9895acd85ace4e
SHA1 hash: d9ccee968fd7931db84df520107608008ddd0a9e
MD5 hash: 00f033767bc50c5e417c98d24857d8aa
humanhash: pip-wyoming-pennsylvania-twelve
File name:92b093b1547bc3437f4a56d5fc3e72fca3cff6a61403b43125e47896719786ad
Download: download sample
Signature CobaltStrike
File size:204'292 bytes
First seen:2020-10-24 22:16:57 UTC
Last seen:2020-10-24 22:20:39 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash e66a62b251fcfbbc930b074503d08542 (24 x CobaltStrike)
ssdeep 3072:HNEfMCK7JqusgLiKG5TnN7FgkQB7R80kUzRe5d1Z:SfM5dS/JBN7jiR80VWZ
Threatray 104 similar samples on MalwareBazaar
TLSH 00148CA53184D032D45B0434674BC77E9E7CBDF016A1A987BFC81E599E716A3EB2A303
Reporter seifreed
Tags:CobaltStrike

Intelligence


File Origin
# of uploads :
2
# of downloads :
91
Origin country :
n/a
Vendor Threat Intelligence
Detection:
CobaltStrikeBeacon
Result
Verdict:
Malware
Maliciousness:
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
68 / 100
Signature
Antivirus / Scanner detection for submitted sample
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 303531 Sample: q4GukSq6lw Startdate: 25/10/2020 Architecture: WINDOWS Score: 68 15 Malicious sample detected (through community Yara rule) 2->15 17 Antivirus / Scanner detection for submitted sample 2->17 19 Multi AV Scanner detection for submitted file 2->19 21 Machine Learning detection for sample 2->21 7 loaddll32.exe 1 2->7         started        process3 process4 9 rundll32.exe 7->9         started        11 rundll32.exe 7->11         started        process5 13 WerFault.exe 23 9 9->13         started       
Threat name:
Win32.PUA.CobaltStrikeBeacon
Status:
Malicious
First seen:
2020-03-09 12:05:00 UTC
AV detection:
30 of 31 (96.77%)
Threat level:
  1/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
ServiceHost packer
Malware Config
C2 Extraction:
http://37.252.15.241:80/IE9CompatViewList.xml
Unpacked files
SH256 hash:
92b093b1547bc3437f4a56d5fc3e72fca3cff6a61403b43125e47896719786ad
MD5 hash:
00f033767bc50c5e417c98d24857d8aa
SHA1 hash:
d9ccee968fd7931db84df520107608008ddd0a9e
Detections:
win_cobalt_strike_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments