MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d4a027269ca7a78f578e980333ac22f8ab39d5f4ef71490b49af6cb884195321. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: d4a027269ca7a78f578e980333ac22f8ab39d5f4ef71490b49af6cb884195321
SHA3-384 hash: d985b3d0fda8aecddd1d240c46de8e0818dd4621b4e8d60bad6eaa52c595402e1eced3539e45b21b0f4230ba9d5d14df
SHA1 hash: cc5a3436c2a58cb2eb0ed0b79eec78dce15cfb55
MD5 hash: 7ffdbac621c852f314b8ff376fef5458
humanhash: iowa-april-kansas-texas
File name:svhost.exe
Download: download sample
Signature CobaltStrike
File size:3'345'796 bytes
First seen:2021-04-06 05:44:36 UTC
Last seen:2021-04-06 07:09:41 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash ced282d9b261d1462772017fe2f6972b (127 x Formbook, 113 x GuLoader, 70 x RemcosRAT)
ssdeep 98304:8hU3o9IUyQnVfi11UKVgion9L1FD0vgnwqHEehWxR:QtzRq1UN9nJ1FYgnwqkeExR
Threatray 517 similar samples on MalwareBazaar
TLSH D8F533C2E293548EF23F0370A5FB8B85D120E8BA2996860E77913D59F5F3315BD8D912
Reporter Anonymous
Tags:CobaltStrike IcedID

Intelligence


File Origin
# of uploads :
2
# of downloads :
586
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
svhost.exe
Verdict:
Malicious activity
Analysis date:
2021-04-06 05:46:46 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Sending a UDP request
DNS request
Sending a custom TCP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
CobaltStrike
Detection:
malicious
Classification:
troj
Score:
88 / 100
Signature
C2 URLs / IPs found in malware configuration
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Yara detected CobaltStrike
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Ogneglazka
Status:
Malicious
First seen:
2021-04-05 00:12:43 UTC
AV detection:
6 of 29 (20.69%)
Threat level:
  5/5
Result
Malware family:
cobaltstrike
Score:
  10/10
Tags:
family:cobaltstrike backdoor trojan
Behaviour
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Loads dropped DLL
Executes dropped EXE
Cobaltstrike
Malware Config
C2 Extraction:
http://englishbreakfasst.com:443/image-directory/fam_newspaper.jpg
http://englishbreakfasst.com:443/be.js
Unpacked files
SH256 hash:
d4a027269ca7a78f578e980333ac22f8ab39d5f4ef71490b49af6cb884195321
MD5 hash:
7ffdbac621c852f314b8ff376fef5458
SHA1 hash:
cc5a3436c2a58cb2eb0ed0b79eec78dce15cfb55
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CobaltStrike

Executable exe d4a027269ca7a78f578e980333ac22f8ab39d5f4ef71490b49af6cb884195321

(this sample)

  
Delivery method
Distributed via web download

Comments