MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cb18432353e218676537e6fca6ab87c1ec57e356933eb8b6a4e012d1d6aaba63. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 9


Intelligence 9 IOCs YARA 13 File information Comments

SHA256 hash: cb18432353e218676537e6fca6ab87c1ec57e356933eb8b6a4e012d1d6aaba63
SHA3-384 hash: 33a750abdbc0bb909621e422eb9e0c87dcf41d202f25cb2b1416423cf1d3d785b3bbebe56e93b9b9f387b8156527eb49
SHA1 hash: 1786a744cc2c04c085bd0ddee3981d0d8d2f9e63
MD5 hash: 4da9eff3a95a5a313218c1a0a4055647
humanhash: louisiana-alaska-pasta-carpet
File name:4da9eff3a95a5a313218c1a0a4055647.exe
Download: download sample
Signature CobaltStrike
File size:47'104 bytes
First seen:2021-06-20 07:30:48 UTC
Last seen:2021-06-20 08:48:49 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 6355eedadf57c4a4eacc2aa5084a60c6 (1 x CobaltStrike)
ssdeep 768:LCmaxqSsdl96nFQlr192Lq4KPgfqzwAvwUnj4:2mJS29uFQlr/2LpKeAvwu4
Threatray 616 similar samples on MalwareBazaar
TLSH 5C23750197AAAE92D2D178F98097B7ED47766B1D0D3B80FCCE867C48E83A94348395D0
Reporter abuse_ch
Tags:CobaltStrike exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
579
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
4da9eff3a95a5a313218c1a0a4055647.exe
Verdict:
Malicious activity
Analysis date:
2021-06-20 07:31:57 UTC
Tags:
trojan meterpreter

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
CobaltStrike
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Drops PE files with benign system names
Found malware configuration
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Copying Sensitive Files with Credential Data
Sigma detected: System File Execution Location Anomaly
System process connects to network (likely due to code injection or exploit)
Yara detected CobaltStrike
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 437276 Sample: Lo0XASbs86.exe Startdate: 20/06/2021 Architecture: WINDOWS Score: 100 46 Found malware configuration 2->46 48 Malicious sample detected (through community Yara rule) 2->48 50 Multi AV Scanner detection for submitted file 2->50 52 6 other signatures 2->52 10 Lo0XASbs86.exe 12 2->10         started        process3 dnsIp4 38 103.234.72.237, 10920, 49688, 49693 HIITL-AS-APHongKongFireLineNetworkLTDHK Hong Kong 10->38 13 cmd.exe 3 10->13         started        process5 file6 34 C:\Users\user\AppData\Local\...\explorer.exe, PE32 13->34 dropped 36 C:\Users\...\explorer.exe:Zone.Identifier, ASCII 13->36 dropped 54 Drops PE files with benign system names 13->54 17 explorer.exe 12 13->17         started        20 cmd.exe 1 13->20         started        22 conhost.exe 13->22         started        signatures7 process8 signatures9 40 System process connects to network (likely due to code injection or exploit) 17->40 42 Multi AV Scanner detection for dropped file 17->42 44 Machine Learning detection for dropped file 17->44 24 cmd.exe 1 17->24         started        26 tasklist.exe 1 20->26         started        process10 process11 28 cmd.exe 1 24->28         started        30 conhost.exe 24->30         started        process12 32 tasklist.exe 1 28->32         started       
Threat name:
Win32.Trojan.CobaltStrike
Status:
Malicious
First seen:
2021-06-12 03:38:00 UTC
AV detection:
15 of 29 (51.72%)
Threat level:
  5/5
Result
Malware family:
cobaltstrike
Score:
  10/10
Tags:
family:cobaltstrike botnet:305419896 backdoor trojan
Behaviour
Enumerates processes with tasklist
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Loads dropped DLL
Executes dropped EXE
Cobaltstrike
Malware Config
C2 Extraction:
http://103.234.72.237:10920/weixin/
Unpacked files
SH256 hash:
cb18432353e218676537e6fca6ab87c1ec57e356933eb8b6a4e012d1d6aaba63
MD5 hash:
4da9eff3a95a5a313218c1a0a4055647
SHA1 hash:
1786a744cc2c04c085bd0ddee3981d0d8d2f9e63
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CobaltStrikeBeacon
Author:enzo
Description:Cobalt Strike Beacon Payload
Rule name:CobaltStrike_Sleep_Decoder_Indicator
Author:yara@s3c.za.net
Description:Detects CobaltStrike sleep_mask decoder
Rule name:CobaltStrike_Unmodifed_Beacon
Author:yara@s3c.za.net
Description:Detects unmodified CobaltStrike beacon DLL
Rule name:crime_win32_csbeacon_1
Author:@VK_Intel
Description:Detects Cobalt Strike loader
Reference:https://twitter.com/VK_Intel/status/1239632822358474753
Rule name:CS_beacon
Author:Etienne Maynier tek@randhome.io
Rule name:HKTL_CobaltStrike_Beacon_Strings
Author:Elastic
Description:Identifies strings used in Cobalt Strike Beacon DLL
Reference:https://www.elastic.co/blog/detecting-cobalt-strike-with-memory-signatures
Rule name:HKTL_Meterpreter_inMemory
Author:netbiosX, Florian Roth
Description:Detects Meterpreter in-memory
Reference:https://www.reddit.com/r/purpleteamsec/comments/hjux11/meterpreter_memory_indicators_detection_tooling/
Rule name:HKTL_Win_CobaltStrike
Author:threatintel@volexity.com
Description:The CobaltStrike malware family.
Reference:https://www.volexity.com/blog/2021/05/27/suspected-apt29-operation-launches-election-fraud-themed-phishing-campaigns/
Rule name:INDICATOR_SUSPICIOUS_ReflectiveLoader
Author:ditekSHen
Description:detects Reflective DLL injection artifacts
Rule name:ReflectiveLoader
Author:Florian Roth
Description:Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended
Reference:Internal Research
Rule name:SUSP_XORed_URL_in_EXE
Author:Florian Roth
Description:Detects an XORed URL in an executable
Reference:https://twitter.com/stvemillertime/status/1237035794973560834
Rule name:WiltedTulip_ReflectiveLoader
Author:Florian Roth
Description:Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip
Reference:http://www.clearskysec.com/tulip
Rule name:win_cobalt_strike_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments