MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 be106bc807b68d8d2bea83f7fbd526675f127b2f234d6c31e2932bb5a5d1aa34. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: be106bc807b68d8d2bea83f7fbd526675f127b2f234d6c31e2932bb5a5d1aa34
SHA3-384 hash: cfef24d5893174b2d22338316d4eb2dd3fb361813b6ecd19d9f53e4332b9ead3c5f074cc8181e3976add33db2d55705c
SHA1 hash: 8460b507c7a50d8df75375ae5f9c79e4efd2913b
MD5 hash: 4fe720ed4820dd5633730c9176790149
humanhash: romeo-ten-colorado-angel
File name:4fe720ed4820dd5633730c9176790149.dll
Download: download sample
Signature CobaltStrike
File size:354'304 bytes
First seen:2021-06-20 07:25:12 UTC
Last seen:2021-06-20 07:35:05 UTC
File type:DLL dll
MIME type:application/x-dosexec
imphash a4295032178dc2932a89d12d68456a8c (2 x CobaltStrike)
ssdeep 6144:LsADrhYOTEA4mdmYLZ7EDDM4+IrXunfO07WT+tYixugtH+m14M9MfQ:HHeEO0aeYFv/M9MfQ
Threatray 287 similar samples on MalwareBazaar
TLSH 3C743936BA95C0B5D0DD45F0691DAA69842C6E3927708CEBE3C07D2F6DF60805BA1F36
Reporter abuse_ch
Tags:CobaltStrike dll

Intelligence


File Origin
# of uploads :
2
# of downloads :
578
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
CobaltStrike
Verdict:
Malicious
Result
Threat name:
CobaltStrike Metasploit
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Contains functionality to detect sleep reduction / modifications
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: CobaltStrike Load by Rundll32
System process connects to network (likely due to code injection or exploit)
Yara detected CobaltStrike
Yara detected Metasploit Payload
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.CobaltStrikeLoader
Status:
Malicious
First seen:
2021-06-11 18:38:07 UTC
AV detection:
20 of 29 (68.97%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
be106bc807b68d8d2bea83f7fbd526675f127b2f234d6c31e2932bb5a5d1aa34
MD5 hash:
4fe720ed4820dd5633730c9176790149
SHA1 hash:
8460b507c7a50d8df75375ae5f9c79e4efd2913b
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments