MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ad42170cf53ef7e0ea91196fedd5f8ae7665e207f9de002c63562f4b1db57717. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 6


Intelligence 6 IOCs YARA 3 File information Comments

SHA256 hash: ad42170cf53ef7e0ea91196fedd5f8ae7665e207f9de002c63562f4b1db57717
SHA3-384 hash: 8597a887b2a40d8d8df3cdaa0c5cb141303548164f29dce39731172c2721193b4cc0d843c3d3e663c5167b50e3b07c9b
SHA1 hash: 6d10912d8b98cd95be423b4a6c8ef7484fa03231
MD5 hash: 7cec66a4fbda013844342c0ddef51750
humanhash: cola-india-yellow-network
File name:ad42170cf53ef7e0ea91196fedd5f8ae7665e207f9de002c63562f4b1db57717
Download: download sample
Signature CobaltStrike
File size:5'588'984 bytes
First seen:2020-07-07 14:25:53 UTC
Last seen:2020-07-07 15:15:44 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f3d3d2ef117a5123acf3821117258457 (2 x CobaltStrike)
ssdeep 98304:4SVzKvzDXOZZAep0Xmpk0sSGeUrUzE2x0uiRcwx2pa15cq:PSvX0dnmtIz77q
Threatray 54 similar samples on MalwareBazaar
TLSH F446592167D44C3EF2B3137C5D69A719656EF9700DE2C80BA294CA3E3A709C1DB61B27
Reporter JAMESWT_WT
Tags:CobaltStrike

Intelligence


File Origin
# of uploads :
2
# of downloads :
97
Origin country :
n/a
Vendor Threat Intelligence
Detection:
CobaltStrikeBeacon
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Creating a file in the Windows subdirectories
Sending an HTTP GET request
Sending a TCP request to an infection source
Threat name:
Win32.Trojan.Cometer
Status:
Malicious
First seen:
2020-07-06 04:28:31 UTC
File Type:
PE (Exe)
Extracted files:
49
AV detection:
21 of 28 (75.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Modifies system certificate store
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CobaltStrike_Unmodifed_Beacon
Author:yara@s3c.za.net
Description:Detects unmodified CobaltStrike beacon DLL
Rule name:ReflectiveLoader
Description:Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended
Reference:Internal Research
Rule name:WiltedTulip_ReflectiveLoader
Author:Florian Roth
Description:Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip
Reference:http://www.clearskysec.com/tulip

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments