General
-
Target
cobalt2.zip
-
Size
2KB
-
Sample
220716-l3q92sbgfp
-
MD5
c10c92f3f091ded1eaa79c6813f558ba
-
SHA1
30c0359321586703f941984c7e6bc2f0c7f4af86
-
SHA256
9df082131558420cde6a0c93a61c235728f49de184549260f0a3596337c07bf5
-
SHA512
d1f79dcb43c19b9e1918c9abd0d0f7e0270615e797c5b1e7980d61d2716129191792934ef169b3c050cea52bfab1166429f5c6eeccee11c362f08f37248f39ab
Behavioral task
behavioral1
Sample
cobalt2.ps1
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
cobalt2.ps1
Resource
win10v2004-20220414-en
Malware Config
Extracted
metasploit
windows/download_exec
http://widisusez.com:443/design/sources/BP2NKQRYF2NI
Targets
-
-
Target
cobalt2.ps1
-
Size
3KB
-
MD5
5816bf8947b292fd5837d340fae832d0
-
SHA1
030b8d8abf08be5d099d8a522d3011963fd84246
-
SHA256
b9dc6cb759631733b4911dff24e61a73d56e47e01d218c7f219b2811cb93e249
-
SHA512
3968e37b2156ffa1f02681d117719670084bf1444dd09e65d2da62ae8740b1c3d040cbbf0c05c6596e281d564ebb0d392e64b644482ef49764abd7b85fd87370
Score8/10-
Blocklisted process makes network request
-