MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d1a71b6a8691f72eb133570b9e90e8de061a652a35e3b4039d0875bbc0f76f1c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 6


Intelligence 6 IOCs YARA 3 File information Comments

SHA256 hash: d1a71b6a8691f72eb133570b9e90e8de061a652a35e3b4039d0875bbc0f76f1c
SHA3-384 hash: 0637e9e7c41161bdb7aa2b7f65d1a30293c3ccbc552b04774fddc57161a3da85892f7fc5962b262d73ebce3471fbcadc
SHA1 hash: 81c8dde6d03d74dc80b02689f171baf3ea4f34a8
MD5 hash: 9f80ece462c2d08eac833ed079c29fa9
humanhash: sixteen-undress-delta-carbon
File name:SecuriteInfo.com.Win32.Heri.31292.9550
Download: download sample
Signature CobaltStrike
File size:5'572'088 bytes
First seen:2020-07-05 10:38:53 UTC
Last seen:2020-07-06 05:19:10 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f3d3d2ef117a5123acf3821117258457 (2 x CobaltStrike)
ssdeep 98304:bSVzKvzDXOZZAep0Xmpk0sSGeUrUzE2x0uiR0wY2hD15cq:aSvX0dnmtIzbWL
Threatray 53 similar samples on MalwareBazaar
TLSH 9846592267D44C3EF2B3137C5D69A719656EF9700DE2C80BA294C63E3A709C1DB61B27
Reporter SecuriteInfoCom
Tags:CobaltStrike

Code Signing Certificate

Organisation:Microsoft Corporation
Issuer:Microsoft Code Signing PCA 2010
Algorithm:sha256WithRSAEncryption
Valid from:Mar 4 18:29:29 2020 GMT
Valid to:Mar 3 18:29:29 2021 GMT
Serial number: 330000032548B29D0E7FC5F41F000000000325
Intelligence: 2 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 82343FD97F607024D4AB3E86E84DCF894A6CE7C865978DA31A34DB5CA494BC16
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
96
Origin country :
n/a
Vendor Threat Intelligence
Detection:
CobaltStrikeBeacon
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Creating a file in the Windows subdirectories
Sending an HTTP GET request
Sending a TCP request to an infection source
Threat name:
Win32.Trojan.Cometer
Status:
Malicious
First seen:
2020-07-03 07:05:00 UTC
File Type:
PE (Exe)
Extracted files:
47
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Modifies system certificate store
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CobaltStrike_Unmodifed_Beacon
Author:yara@s3c.za.net
Description:Detects unmodified CobaltStrike beacon DLL
Rule name:ReflectiveLoader
Description:Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended
Reference:Internal Research
Rule name:WiltedTulip_ReflectiveLoader
Author:Florian Roth
Description:Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip
Reference:http://www.clearskysec.com/tulip

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CobaltStrike

Executable exe d1a71b6a8691f72eb133570b9e90e8de061a652a35e3b4039d0875bbc0f76f1c

(this sample)

  
Delivery method
Distributed via web download

Comments