MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fba9dd0ebb8d838fa394cda10dca50450d8c0fc6158deff38904072140d64507. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: fba9dd0ebb8d838fa394cda10dca50450d8c0fc6158deff38904072140d64507
SHA3-384 hash: ec63f6528f7ba5a42db74a586f97bc11998059f288ce8085b94c050db8dfdb76c6285aadb5391e051a54b8f094842f6b
SHA1 hash: 2c4aaefe0c20843db9b9f4996d42c7563b081097
MD5 hash: b873bfa8dec8c3a1f62c30903e59e849
humanhash: robin-michigan-social-magazine
File name:oben32.dll
Download: download sample
Signature CobaltStrike
File size:362'496 bytes
First seen:2021-12-14 14:01:31 UTC
Last seen:2021-12-14 17:05:35 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash bd51a645a9c68bd03b2e51586e5cbdcb (4 x RemcosRAT, 1 x Exorcist, 1 x Formbook)
ssdeep 6144:4GG9uLzUVA9S35rB9msFdC/6Oy6MpNahmawTxLUfq3e7BuXIYtEiwW4VpJQ9gHRa:lzQe5T
Threatray 466 similar samples on MalwareBazaar
TLSH T147742D09CF5DC2CBEED640B4DCAAB9CBD138DB924C9045F3BEA98D967C228395507E44
Reporter malware_traffic
Tags:64-bit Cobalt Strike CobaltStrike dll exe


Avatar
malware_traffic
64-bit DLL for Cobalt Strike. Can be run using regsvr32.exe [filename]

Intelligence


File Origin
# of uploads :
2
# of downloads :
596
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
oben32.dll
Verdict:
No threats detected
Analysis date:
2021-12-14 14:02:51 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Launching the default Windows debugger (dwwin.exe)
Searching for the window
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
60 / 100
Signature
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Call by Ordinal
System process connects to network (likely due to code injection or exploit)
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 539567 Sample: oben32.dll Startdate: 14/12/2021 Architecture: WINDOWS Score: 60 39 Multi AV Scanner detection for submitted file 2->39 41 Sigma detected: Suspicious Call by Ordinal 2->41 8 loaddll64.exe 1 2->8         started        process3 dnsIp4 33 api.musicbee.getlist.destinycraftpe.com 8->33 11 cmd.exe 1 8->11         started        13 rundll32.exe 8->13         started        17 regsvr32.exe 8->17         started        19 WerFault.exe 17 9 8->19         started        process5 dnsIp6 21 rundll32.exe 11->21         started        45 System process connects to network (likely due to code injection or exploit) 13->45 25 WerFault.exe 20 9 13->25         started        35 api.musicbee.getlist.destinycraftpe.com 104.41.145.218, 443, 49749, 49750 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 17->35 27 WerFault.exe 17 9 17->27         started        37 192.168.2.1 unknown unknown 19->37 signatures7 process8 dnsIp9 31 api.musicbee.getlist.destinycraftpe.com 21->31 43 System process connects to network (likely due to code injection or exploit) 21->43 29 WerFault.exe 9 21->29         started        signatures10 process11
Threat name:
Win64.Trojan.CobaltStrike
Status:
Malicious
First seen:
2021-12-14 14:02:12 UTC
File Type:
PE+ (Dll)
AV detection:
21 of 28 (75.00%)
Threat level:
  5/5
Result
Malware family:
cobaltstrike
Score:
  10/10
Tags:
family:cobaltstrike backdoor trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Cobaltstrike
Suspicious use of NtCreateProcessExOtherParentProcess
Malware Config
C2 Extraction:
http://api.musicbee.getlist.destinycraftpe.com:443/azure/v2/api
Unpacked files
SH256 hash:
fba9dd0ebb8d838fa394cda10dca50450d8c0fc6158deff38904072140d64507
MD5 hash:
b873bfa8dec8c3a1f62c30903e59e849
SHA1 hash:
2c4aaefe0c20843db9b9f4996d42c7563b081097
Malware family:
Cobalt Strike
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CobaltStrike

Executable exe fba9dd0ebb8d838fa394cda10dca50450d8c0fc6158deff38904072140d64507

(this sample)

  
Delivery method
Distributed via web download

Comments