_ReflectiveLoader@4
Static task
static1
Behavioral task
behavioral1
Sample
e5cd425a6e6062b28f7dab5b8000d4eafe5eb1fecde49b0339705664731a4a2a.dll
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
e5cd425a6e6062b28f7dab5b8000d4eafe5eb1fecde49b0339705664731a4a2a.dll
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
e5cd425a6e6062b28f7dab5b8000d4eafe5eb1fecde49b0339705664731a4a2a
-
Size
207KB
-
MD5
7bfda68885a682f0c73e950800e10f6d
-
SHA1
a84e2240161fc392c329bdd0d5fe2feb8805e3a1
-
SHA256
e5cd425a6e6062b28f7dab5b8000d4eafe5eb1fecde49b0339705664731a4a2a
-
SHA512
c4d1f04cf1f422c714708278fc89da2a24054cb8f29fb99fa299c525db8547806b6ca36250d765036acd5fd596deb2745eb49eea1b1404cc49f5ae0cc2b7ddd5
Score
10/10
Malware Config
Signatures
-
Cobalt Strike reflective loader 1 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule sample cobalt_reflective_dll -
Cobaltstrike family
Files
-
e5cd425a6e6062b28f7dab5b8000d4eafe5eb1fecde49b0339705664731a4a2a.dll windows x86
Exports
Exports