_ReflectiveLoader@4
Static task
static1
Behavioral task
behavioral1
Sample
e69fc42be5857f3535d8f2dd24cac1cd1f23bd9c88a5fe7aad3cf1ce7d1a5eaa.dll
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
e69fc42be5857f3535d8f2dd24cac1cd1f23bd9c88a5fe7aad3cf1ce7d1a5eaa.dll
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
e69fc42be5857f3535d8f2dd24cac1cd1f23bd9c88a5fe7aad3cf1ce7d1a5eaa
-
Size
202KB
-
MD5
c98df0fc1bae93c9a904ac4c0dde5106
-
SHA1
4c28ac10e5a9cb231a9886942bcff1647e8e3632
-
SHA256
e69fc42be5857f3535d8f2dd24cac1cd1f23bd9c88a5fe7aad3cf1ce7d1a5eaa
-
SHA512
d6d84a1fcecb588eb702c79b006be2929a96085152c11a5c22e18d83e19953a4647e7d092c653c1a18c6e10ed37e7e2ef86a085f21cb04ead7d63b159f113fe8
Score
10/10
Malware Config
Signatures
-
Cobalt Strike reflective loader 1 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule sample cobalt_reflective_dll -
Cobaltstrike family
Files
-
e69fc42be5857f3535d8f2dd24cac1cd1f23bd9c88a5fe7aad3cf1ce7d1a5eaa.dll windows x86
Exports
Exports