_ReflectiveLoader@4
Static task
static1
Behavioral task
behavioral1
Sample
f1ea6e81b8737e82bdbc34d3ba8dea1adabd59ed9ccf33887cdd5cee10c77c14.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
f1ea6e81b8737e82bdbc34d3ba8dea1adabd59ed9ccf33887cdd5cee10c77c14.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
f1ea6e81b8737e82bdbc34d3ba8dea1adabd59ed9ccf33887cdd5cee10c77c14
-
Size
202KB
-
MD5
9594e6a988795c2985e2455a0a24fae0
-
SHA1
ef102f247ac255717ae8294944c91508399995c9
-
SHA256
f1ea6e81b8737e82bdbc34d3ba8dea1adabd59ed9ccf33887cdd5cee10c77c14
-
SHA512
f4af7e8c3141b2967fb568280352520a61b5ee5d2eba6c9c7d0a48d1f787c7d16e76d9889ccfd7ca837056f6f9e4bf63390b15c0e20052526455bb67c812731b
Score
10/10
Malware Config
Signatures
-
Cobalt Strike reflective loader 1 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule sample cobalt_reflective_dll -
Cobaltstrike family
Files
-
f1ea6e81b8737e82bdbc34d3ba8dea1adabd59ed9ccf33887cdd5cee10c77c14.dll windows x86
Exports
Exports