_ReflectiveLoader@4
Static task
static1
Behavioral task
behavioral1
Sample
2abccc4287c95d66c28ee3048a6afd18a2f919d064998f65cd57050a59b473f0.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
2abccc4287c95d66c28ee3048a6afd18a2f919d064998f65cd57050a59b473f0.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
2abccc4287c95d66c28ee3048a6afd18a2f919d064998f65cd57050a59b473f0
-
Size
207KB
-
MD5
9b4e6583382d217cdc1e017797a469be
-
SHA1
de3d60e2e4f57f4ffc9e801eb353b4ba6d534885
-
SHA256
2abccc4287c95d66c28ee3048a6afd18a2f919d064998f65cd57050a59b473f0
-
SHA512
2cc7339a5bcf8b83a3fb156f9c27c03e59a49a644bb3ed4753a4ae322eb7383c1ba45187e3a373be991c0a722f5eaab703f2a255faec216afcf1b4caf255c7ba
Score
10/10
Malware Config
Signatures
-
Cobalt Strike reflective loader 1 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule sample cobalt_reflective_dll -
Cobaltstrike family
Files
-
2abccc4287c95d66c28ee3048a6afd18a2f919d064998f65cd57050a59b473f0.dll windows x86
Exports
Exports