_ReflectiveLoader@4
Static task
static1
Behavioral task
behavioral1
Sample
a2e894ea532e0dbd116400650a32066b7facecc6763115a7e0691864f288215f.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
a2e894ea532e0dbd116400650a32066b7facecc6763115a7e0691864f288215f.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
a2e894ea532e0dbd116400650a32066b7facecc6763115a7e0691864f288215f
-
Size
207KB
-
MD5
f0d8f7721e584a2407bfb2563110fc5a
-
SHA1
d1cd10e44743b97edf5d18fd1bd66ce01f904ef8
-
SHA256
a2e894ea532e0dbd116400650a32066b7facecc6763115a7e0691864f288215f
-
SHA512
fcb5ddfe77f0713a14d4417a6819d3b8c25ef049d04cf76ee3dd4b7a25c3151919e8d4018325d67dbc1b9563e2e3892626ee997519a318d1fa10fa31b41b35d6
Score
10/10
Malware Config
Signatures
-
Cobalt Strike reflective loader 1 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule sample cobalt_reflective_dll -
Cobaltstrike family
Files
-
a2e894ea532e0dbd116400650a32066b7facecc6763115a7e0691864f288215f.dll windows x86
Exports
Exports