MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f8c94e76f4d756924bf929b32f85158bc81911ce4a606af67e37460405e0ad3f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: f8c94e76f4d756924bf929b32f85158bc81911ce4a606af67e37460405e0ad3f
SHA3-384 hash: c3aa8b926e1d118c23022dd71f78950cc7a1e671814328b82a8570fede1e3d2406c2e9f36be5313463d79d883ffe0977
SHA1 hash: a0ccb227c6450eab38a821e45dcfd4d3ad8296eb
MD5 hash: 16057a5b83e5b67e8294c3ffd5fb7cab
humanhash: video-burger-red-london
File name:f8c94e76f4d756924bf929b32f85158bc81911ce4a606af67e37460405e0ad3f.bin
Download: download sample
Signature CobaltStrike
File size:1'368'064 bytes
First seen:2020-07-28 14:48:28 UTC
Last seen:2020-07-28 15:48:56 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 91802a615b3a5c4bcc05bc5f66a5b219 (18 x Glupteba, 6 x Rhadamanthys, 3 x CobaltStrike)
ssdeep 24576:lFpY2pfz80HS71oGLS4azoSuEUlSrARCCzwW7f:l7Tpfz80HSxoASro4VrARCt
Threatray 1'320 similar samples on MalwareBazaar
TLSH E2554A837CE118BDD57DF27149A686A13633B86843337BC31E5465BA1A6AED07F2D320
Reporter sysopfb1
Tags:CobaltStrike golang

Intelligence


File Origin
# of uploads :
2
# of downloads :
121
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a custom TCP request
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
56 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win64.Trojan.Shelma
Status:
Malicious
First seen:
2020-07-06 16:02:51 UTC
AV detection:
18 of 29 (62.07%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments