Static task
static1
Behavioral task
behavioral1
Sample
d2e8df83543dd192ac86bc1a085b62f6fcffb1ca8cead22febd4cec634089483.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
d2e8df83543dd192ac86bc1a085b62f6fcffb1ca8cead22febd4cec634089483.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
Errors
Reason
config extraction: CobaltStrike: pe: invalid address
General
-
Target
d2e8df83543dd192ac86bc1a085b62f6fcffb1ca8cead22febd4cec634089483
-
Size
244KB
-
MD5
5fd0510ba7ff98703473f3d4e72dd39e
-
SHA1
6572ec3ff1e71f1765f3852339b5a1d58dc00e0d
-
SHA256
d2e8df83543dd192ac86bc1a085b62f6fcffb1ca8cead22febd4cec634089483
-
SHA512
48c2aa8bca70469e1611c9b772e6c99163d95fdcec026021214c10c09ae2684eb79c1eaa080ceb2e10c956043168d166a3306da9fa78cc77cc53c6c01a1da739
Score
10/10
Malware Config
Signatures
-
Cobalt Strike reflective loader 1 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule sample cobalt_reflective_dll -
Cobaltstrike family
Files
-
d2e8df83543dd192ac86bc1a085b62f6fcffb1ca8cead22febd4cec634089483.dll windows x86