_ReflectiveLoader@4
Static task
static1
Behavioral task
behavioral1
Sample
2083b575bca73c7b9711a8196b5d74fa2c32225c978881794449e0f96eab7538.dll
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
2083b575bca73c7b9711a8196b5d74fa2c32225c978881794449e0f96eab7538.dll
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
2083b575bca73c7b9711a8196b5d74fa2c32225c978881794449e0f96eab7538
-
Size
199KB
-
MD5
5d0bbc4db7f2771b87c4aa5389381a3a
-
SHA1
82a9e68b18f84c31b71cecbdf1f983067b70ec06
-
SHA256
2083b575bca73c7b9711a8196b5d74fa2c32225c978881794449e0f96eab7538
-
SHA512
797052afcefd402423b9112aa968eaf9b7c2998f525ad9347ee86f4d0c8336f5f52ce9c5ba2a5c3bebe1b142fdc47b141414a0125e8e2fe1d3a285122bbb20a3
Score
10/10
Malware Config
Signatures
-
Cobalt Strike reflective loader 1 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule sample cobalt_reflective_dll -
Cobaltstrike family
Files
-
2083b575bca73c7b9711a8196b5d74fa2c32225c978881794449e0f96eab7538.dll windows x86
Exports
Exports