MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dc460f03652eb64c6aeb07a3684780dda19d55dc7e80cc470b61eb2d22b4772c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Metasploit


Vendor detections: 13


Intelligence 13 IOCs YARA 5 File information Comments

SHA256 hash: dc460f03652eb64c6aeb07a3684780dda19d55dc7e80cc470b61eb2d22b4772c
SHA3-384 hash: 676736a41e58d43d589e796a8566bc077ba96d733ebae53c412575925e53c28d987ff9e3aa2e6dde8ddfb612243eca4c
SHA1 hash: c4a1e189c6707d4af8e5652a58e2d1d92c073ecc
MD5 hash: 43780b5d07144e9fd0f547333148f002
humanhash: coffee-grey-saturn-idaho
File name:43780b5d07144e9fd0f547333148f002.exe
Download: download sample
Signature Metasploit
File size:16'384 bytes
First seen:2024-05-03 09:27:41 UTC
Last seen:2024-05-03 10:25:10 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 959c0d45f45bcdbc93238edbc80a340e (1 x Metasploit)
ssdeep 384:qktbUK2aFt/faevMcvojAC+DLbs6Od50mzhEIp8:J1/fFMcv2+nbodCR
TLSH T1A7724B03FD010AB1DFA949B5247BA99AC5BB6A305F705ED3EFD0995D05B00F0EA3582E
TrID 32.2% (.EXE) Win64 Executable (generic) (10523/12/4)
20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
13.7% (.EXE) Win32 Executable (generic) (4504/4/1)
6.2% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter abuse_ch
Tags:exe Metasploit

Intelligence


File Origin
# of uploads :
2
# of downloads :
407
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
asyncrat
ID:
1
File name:
dc460f03652eb64c6aeb07a3684780dda19d55dc7e80cc470b61eb2d22b4772c.exe
Verdict:
Malicious activity
Analysis date:
2024-05-03 09:38:10 UTC
Tags:
rat asyncrat remote cobaltstrike

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Result
Threat name:
CobaltStrike, Metasploit
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Sigma detected: Rundll32 Execution Without Parameters
System process connects to network (likely due to code injection or exploit)
Yara detected CobaltStrike
Yara detected Metasploit Payload
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.CobaltStrikeBeacon
Status:
Malicious
First seen:
2024-04-28 08:13:24 UTC
File Type:
PE (Exe)
Extracted files:
2
AV detection:
22 of 37 (59.46%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
cobaltstrike
Result
Malware family:
metasploit
Score:
  10/10
Tags:
family:cobaltstrike family:metasploit botnet:100000000 backdoor trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Blocklisted process makes network request
Cobaltstrike
MetaSploit
Malware Config
C2 Extraction:
http://207.148.109.8:443/sig32.gif
http://207.148.109.8:443/ptj
Unpacked files
SH256 hash:
dc460f03652eb64c6aeb07a3684780dda19d55dc7e80cc470b61eb2d22b4772c
MD5 hash:
43780b5d07144e9fd0f547333148f002
SHA1 hash:
c4a1e189c6707d4af8e5652a58e2d1d92c073ecc
Detections:
cobaltstrike_payload_encoded Cobaltbaltstrike_Payload_Encoded Base64_PS1_Shellcode
Malware family:
CobaltStrike
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Base64_PS1_Shellcode
Author:Nick Carr, David Ledbetter
Description:Detects Base64 encoded PS1 Shellcode
Reference:https://twitter.com/ItsReallyNick/status/1062601684566843392
Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:Cobaltbaltstrike_Payload_Encoded
Author:Avast Threat Intel Team
Description:Detects CobaltStrike payloads
Reference:https://github.com/avast/ioc
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessA
KERNEL32.dll::VirtualAllocEx
KERNEL32.dll::WriteProcessMemory
KERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileA
KERNEL32.dll::CreateFileMappingW

Comments