MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b5936bb67edde581cbd73771f51c5b7a5304eee82103c02ed6a748d2128f94d1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: b5936bb67edde581cbd73771f51c5b7a5304eee82103c02ed6a748d2128f94d1
SHA3-384 hash: 0f9401335d84ca835d734c5fda72f60b63dbdd64b85b82b5dc34dac785db2793c5ccfef40b6fcd04e079d3afa25497a0
SHA1 hash: 571afaba3fa57301d764f6f1d0b1a55144b1bc3f
MD5 hash: b7b3f1dc9bf4c289cca45e7435b0517a
humanhash: eighteen-montana-nitrogen-diet
File name:b7b3f1dc9bf4c289cca45e7435b0517a.exe
Download: download sample
Signature CobaltStrike
File size:759'296 bytes
First seen:2023-07-11 09:01:17 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c227e9ac4acc08281941d59ae61530a1 (1 x CobaltStrike)
ssdeep 12288:FmKG1kyRAn13L1uOt7v7eafKet2CoBCpvCZeHzQGczP15kv6t9ONfU5XzPMYO:FPF1/3K/JCRqeTQ/LXCqEYO
Threatray 274 similar samples on MalwareBazaar
TLSH T1B2F40246B7850AFCD67BE679C903236FEF7038998214870B16E589573F275386B2E312
TrID 50.0% (.EXE) Generic Win/DOS Executable (2002/3)
49.9% (.EXE) DOS Executable Generic (2000/1)
File icon (PE):PE icon
dhash icon 72c9bcf4b49ccd5a (1 x CobaltStrike)
Reporter obfusor
Tags:Cobalt Strike exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
297
Origin country :
HK HK
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
b7b3f1dc9bf4c289cca45e7435b0517a.exe
Verdict:
Malicious activity
Analysis date:
2023-07-11 09:05:21 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Adding an access-denied ACE
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
evad
Score:
56 / 100
Signature
Checks if the current machine is a virtual machine (disk enumeration)
Multi AV Scanner detection for submitted file
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Behaviour
Behavior Graph:
Threat name:
Win64.Backdoor.CobaltStrikeBeacon
Status:
Suspicious
First seen:
2023-07-11 09:02:07 UTC
File Type:
PE+ (Exe)
Extracted files:
1
AV detection:
14 of 24 (58.33%)
Threat level:
  5/5
Result
Malware family:
cobaltstrike
Score:
  10/10
Tags:
family:cobaltstrike botnet:100000000 backdoor evasion trojan
Behaviour
Checks SCSI registry key(s)
Checks system information in the registry
Maps connected drives based on registry
Checks BIOS information in registry
Identifies Wine through registry keys
Looks for VMWare Tools registry key
Enumerates VirtualBox registry keys
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Looks for VirtualBox Guest Additions in registry
Cobaltstrike
Malware Config
C2 Extraction:
http://service-j3lu1dcf-1259409518.bj.apigw.tencentcs.com:443/api/x
Unpacked files
SH256 hash:
b5936bb67edde581cbd73771f51c5b7a5304eee82103c02ed6a748d2128f94d1
MD5 hash:
b7b3f1dc9bf4c289cca45e7435b0517a
SHA1 hash:
571afaba3fa57301d764f6f1d0b1a55144b1bc3f
Malware family:
CobaltStrike
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments