_ReflectiveLoader@4
Static task
static1
Behavioral task
behavioral1
Sample
c06df50b2c8547145a269f0dd21c94ecb4b895858f35bba2a6b341114c44bb20.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
c06df50b2c8547145a269f0dd21c94ecb4b895858f35bba2a6b341114c44bb20.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
c06df50b2c8547145a269f0dd21c94ecb4b895858f35bba2a6b341114c44bb20
-
Size
207KB
-
MD5
c4ee399d9808f820963bd28a8c5a9b40
-
SHA1
b2e65884f0b3ee687712f244a6592a05360feef0
-
SHA256
c06df50b2c8547145a269f0dd21c94ecb4b895858f35bba2a6b341114c44bb20
-
SHA512
933940a3f2f225e212dfa982cb94daddfa682a6e3300aff5d5b57310b28e42d633fcdb17a09654daf5f5f9aeeac5c5fb03605db88e10b63ddbaa123e2e17ea6c
Score
10/10
Malware Config
Signatures
-
Cobalt Strike reflective loader 1 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule sample cobalt_reflective_dll -
Cobaltstrike family
Files
-
c06df50b2c8547145a269f0dd21c94ecb4b895858f35bba2a6b341114c44bb20.dll windows x86
Exports
Exports