MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9c9e8841d706406bc23d05589f77eec6f8df6d5e4076bc6a762fdb423bfe8c24. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 9


Intelligence 9 IOCs YARA 4 File information Comments

SHA256 hash: 9c9e8841d706406bc23d05589f77eec6f8df6d5e4076bc6a762fdb423bfe8c24
SHA3-384 hash: fcb3b35ee70f4d048addf331aea3fdb97283b32f64a948ae61847bbb56e68fc7c41da57257881a898dfda34eb5e97e42
SHA1 hash: dacef6d2fea829d0d6a7386b5173d34ec140e6ef
MD5 hash: 6dea03b74f33d78a1dc1deea989c4ba5
humanhash: delaware-illinois-white-pasta
File name:a
Download: download sample
Signature CobaltStrike
File size:226'788 bytes
First seen:2023-05-09 11:52:33 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 6144:KfhoHylVnvorogjjvfD2Emhylcg3ylPG+0eCazxK/:+GHSVvo8gXniEW1gilPGveCT
TLSH T13B2423321EA84CF289B90FD0F227CD38576AA02755C6CB8306F694F792687525DE9C73
Reporter xorJosh
Tags:CobaltStrike ps1


Avatar
xorJosh
Delivered through possible exploitation of external facing orcale application (weblogic unconfirmed)

Intelligence


File Origin
# of uploads :
1
# of downloads :
260
Origin country :
GB GB
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
cobaltstrike obfuscated
Result
Verdict:
MALICIOUS
Result
Threat name:
CobaltStrike, Metasploit
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
Contains functionality to detect sleep reduction / modifications
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sample uses string decryption to hide its real strings
Yara detected CobaltStrike
Yara detected MetasploitPayload
Behaviour
Behavior Graph:
Threat name:
Script-PowerShell.Trojan.CobaltStrikeBeacon
Status:
Malicious
First seen:
2023-05-09 11:53:05 UTC
File Type:
Text (PowerShell)
AV detection:
14 of 37 (37.84%)
Threat level:
  5/5
Result
Malware family:
cobaltstrike
Score:
  10/10
Tags:
family:cobaltstrike botnet:0 botnet:100000 backdoor trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Blocklisted process makes network request
Cobaltstrike
Malware Config
C2 Extraction:
http://81.70.197.244:4433//jquery-3.3.1.min.js
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:CobaltStrike_Resources_Command_Ps1_v2_5_to_v3_7_and_Resources_Compress_Ps1_v3_8_to_v4_x
Author:gssincla@google.com
Description:Cobalt Strike's resources/command.ps1 for versions 2.5 to v3.7 and resources/compress.ps1 from v3.8 to v4.x
Reference:https://cloud.google.com/blog/products/identity-security/making-cobalt-strike-harder-for-threat-actors-to-abuse
Rule name:CobaltStrike__Resources_Command_Ps1_v2_5_to_v3_7_and_Resources_Compress_Ps1_v3_8_to_v4_x
Author:gssincla@google.com
Rule name:SUSP_PS1_FromBase64String_Content_Indicator_RID3714
Author:Florian Roth
Description:Detects suspicious base64 encoded PowerShell expressions
Reference:https://gist.github.com/Neo23x0/6af876ee72b51676c82a2db8d2cd3639

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments