_ReflectiveLoader@4
Static task
static1
Behavioral task
behavioral1
Sample
6b1c0ee446164e6d7c87ad73589570d3ddafda57d73cab513ac6d8ccd248e948.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
6b1c0ee446164e6d7c87ad73589570d3ddafda57d73cab513ac6d8ccd248e948.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
6b1c0ee446164e6d7c87ad73589570d3ddafda57d73cab513ac6d8ccd248e948
-
Size
207KB
-
MD5
c70f58a9e0e53319d41d90e0d809d0c9
-
SHA1
37ae61830d28fb573aa4a06a5239c2f9a98ce9e9
-
SHA256
6b1c0ee446164e6d7c87ad73589570d3ddafda57d73cab513ac6d8ccd248e948
-
SHA512
c4622b1a77f9c5f6c88db722e9de5b1be62d79e3e96d4feca3100d22be6a25766530175152fc08a883bfbd6a9ebf89a9b789e1c6a909ee3d51d406c6eef12a0f
Score
10/10
Malware Config
Signatures
-
Cobalt Strike reflective loader 1 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule sample cobalt_reflective_dll -
Cobaltstrike family
Files
-
6b1c0ee446164e6d7c87ad73589570d3ddafda57d73cab513ac6d8ccd248e948.dll windows x86
Exports
Exports