_ReflectiveLoader@4
Static task
static1
Behavioral task
behavioral1
Sample
f609e2e77f76e891d3533b0c3eb6db5bb8385e120fd1101e509ba1313cc3135a.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
f609e2e77f76e891d3533b0c3eb6db5bb8385e120fd1101e509ba1313cc3135a.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
f609e2e77f76e891d3533b0c3eb6db5bb8385e120fd1101e509ba1313cc3135a
-
Size
207KB
-
MD5
9f02bd144161a53608d3b6c0e493e6f1
-
SHA1
df3177d4830eeb1fa5d89e1264dc299a01f617ba
-
SHA256
f609e2e77f76e891d3533b0c3eb6db5bb8385e120fd1101e509ba1313cc3135a
-
SHA512
047fc9d96d3b70b7c5e83a0e110636cf68117d460c7ff896bf065ed211d2fdb0833b6a350e8f9fc69825a8889dce1224ce944c51e5cc2722c15e3189b4447403
Score
10/10
Malware Config
Signatures
-
Cobalt Strike reflective loader 1 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule sample cobalt_reflective_dll -
Cobaltstrike family
Files
-
f609e2e77f76e891d3533b0c3eb6db5bb8385e120fd1101e509ba1313cc3135a.dll windows x86
Exports
Exports