MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dff1da3407eaf5a16558d8561b42720d9382dbbee8b9169847a6e1560b4250df. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 4


Intelligence 4 IOCs YARA 9 File information Comments

SHA256 hash: dff1da3407eaf5a16558d8561b42720d9382dbbee8b9169847a6e1560b4250df
SHA3-384 hash: f81f6bf8ff04ac300689dfa9dfe717d8e305e483c67ca597003f4a3f3c6a3cd066e3d31ca0749dec7c9d92a1b0d895e8
SHA1 hash: 0c4916330fd2a799ebb2c7454e297b8430269c0c
MD5 hash: 8990d02d8d271b75d0ea986154d55a7d
humanhash: lima-muppet-papa-mockingbird
File name:8990d02d8d271b75d0ea986154d55a7d.exe
Download: download sample
Signature CobaltStrike
File size:284'160 bytes
First seen:2020-06-11 16:10:21 UTC
Last seen:2020-06-11 16:45:20 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 14c880d25a4c148062626b35d23ad003 (2 x CobaltStrike)
ssdeep 3072:/9f/CVEVq0cQNe4YG9NU7dC6RmYvUYN7p0y1WFVqNYvuee1BdF/jJz1:1f+Uq0cQN9Yn7RmOFKdWYvueUJVz1
Threatray 66 similar samples on MalwareBazaar
TLSH 6054BDE5CEE42197CB64BBBF4B072EA570FA6224792460832907D372117DC28B9F745A
Reporter oppimaniac
Tags:CobaltStrike

Intelligence


File Origin
# of uploads :
2
# of downloads :
87
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Cometer
Status:
Malicious
First seen:
2020-06-11 16:12:08 UTC
AV detection:
28 of 31 (90.32%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Beacon_K5om
Author:Florian Roth
Description:Detects Meterpreter Beacon - file K5om.dll
Reference:https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html
Rule name:CobaltStrike_Unmodifed_Beacon
Author:yara@s3c.za.net
Description:Detects unmodified CobaltStrike beacon DLL
Rule name:Leviathan_CobaltStrike_Sample_1
Author:Florian Roth
Description:Detects Cobalt Strike sample from Leviathan report
Reference:https://goo.gl/MZ7dRg
Rule name:Malware_QA_vqgk
Author:Florian Roth
Description:VT Research QA uploaded malware - file vqgk.dll
Reference:VT Research QA
Rule name:PowerShell_Susp_Parameter_Combo
Author:Florian Roth
Description:Detects PowerShell invocation with suspicious parameters
Reference:https://goo.gl/uAic1X
Rule name:ReflectiveLoader
Description:Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended
Reference:Internal Research
Rule name:Reflective_DLL_Loader_Aug17_2
Author:Florian Roth
Description:Detects Reflective DLL Loader - suspicious - Possible FP could be program crack
Reference:Internal Research
Rule name:WiltedTulip_ReflectiveLoader
Author:Florian Roth
Description:Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip
Reference:http://www.clearskysec.com/tulip

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments