_ReflectiveLoader@4
Static task
static1
Behavioral task
behavioral1
Sample
68c56df172f7293805b94e92f2611e514025a4b0dbdcc00c510224a8da4b3088.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
68c56df172f7293805b94e92f2611e514025a4b0dbdcc00c510224a8da4b3088.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
68c56df172f7293805b94e92f2611e514025a4b0dbdcc00c510224a8da4b3088
-
Size
199KB
-
MD5
46f46ade0fd2e8441d58fc443e158412
-
SHA1
6a6c86ee912a59369857dd79a291e4c9a6d1ea17
-
SHA256
68c56df172f7293805b94e92f2611e514025a4b0dbdcc00c510224a8da4b3088
-
SHA512
e4f12ece6c7d6b02f7413afd534671e980b7a3bf822ac57bf1ee566eb4c6f438befd7b55e3a18f78df2c3b0d1a52ce82b22d3f647bdd0d9844eedd2668c4d968
Score
10/10
Malware Config
Signatures
-
Cobalt Strike reflective loader 1 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule sample cobalt_reflective_dll -
Cobaltstrike family
Files
-
68c56df172f7293805b94e92f2611e514025a4b0dbdcc00c510224a8da4b3088.dll windows x86
Exports
Exports