_ReflectiveLoader@4
Static task
static1
Behavioral task
behavioral1
Sample
c24e38b26e263c058d8972af7e428bf9989cd841fb48b79d417f157bcfba9d19.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
c24e38b26e263c058d8972af7e428bf9989cd841fb48b79d417f157bcfba9d19.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
c24e38b26e263c058d8972af7e428bf9989cd841fb48b79d417f157bcfba9d19
-
Size
204KB
-
MD5
a5e1083b35ec044ed10cf64dc592f0a2
-
SHA1
ae79710f0107970312da06455d53532263377cf4
-
SHA256
c24e38b26e263c058d8972af7e428bf9989cd841fb48b79d417f157bcfba9d19
-
SHA512
85a77179dff2df9a8bec76d5cbf3fe9d8fd3754a9c40c01534ef991dd06b5499f60cd6c715f6f02d15bd8bf3a0e57d2c1792b6c1d2ca4a130730fc5fb7c600c5
Score
10/10
Malware Config
Signatures
-
Cobalt Strike reflective loader 1 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule sample cobalt_reflective_dll -
Cobaltstrike family
Files
-
c24e38b26e263c058d8972af7e428bf9989cd841fb48b79d417f157bcfba9d19.dll windows x86
Exports
Exports