Static task
static1
Behavioral task
behavioral1
Sample
0708ca0919859901ece5681e3657db75a07e2fc9d1e03fec06ed24629aa05e6c.dll
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
0708ca0919859901ece5681e3657db75a07e2fc9d1e03fec06ed24629aa05e6c.dll
Resource
win10v20201028
0 signatures
0 seconds
Errors
Reason
config extraction: CobaltStrike: pe: invalid address
General
-
Target
0708ca0919859901ece5681e3657db75a07e2fc9d1e03fec06ed24629aa05e6c
-
Size
244KB
-
MD5
a0c17e40e2e5ea2e61174eb67469ef72
-
SHA1
bf0d30eb7ff2e4088bcf9a2dfb01964f05865883
-
SHA256
0708ca0919859901ece5681e3657db75a07e2fc9d1e03fec06ed24629aa05e6c
-
SHA512
c98549e4f4bc5c8e09624e464d9fa173791a0f87699f3bc0e19716304f776eb2b155464ff9f71f7fe610828988fd510dc71df3bd98fd9a4c707a87b4d77a0d26
Score
10/10
Malware Config
Signatures
-
Cobalt Strike reflective loader 1 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule sample cobalt_reflective_dll -
Cobaltstrike family
Files
-
0708ca0919859901ece5681e3657db75a07e2fc9d1e03fec06ed24629aa05e6c.dll windows x86