Analysis
-
max time kernel
142s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 01:13
Behavioral task
behavioral1
Sample
2024-05-20_3fd88d757882f2004ec0da4b35033e5e_cobalt-strike_cobaltstrike.exe
Resource
win7-20240508-en
windows7-x64
11 signatures
150 seconds
General
-
Target
2024-05-20_3fd88d757882f2004ec0da4b35033e5e_cobalt-strike_cobaltstrike.exe
-
Size
6.0MB
-
MD5
3fd88d757882f2004ec0da4b35033e5e
-
SHA1
e35541d2028dcd9dc735e21474ce3765c0a2382d
-
SHA256
8a4082c8b1d91b2ef9b2621158656f44825fcae9291ae1bf1dc0e3caa3ada965
-
SHA512
975b1ca4d5042f76f4afccc2eaf181842a1761aeb621d014d679304f03b1c3fe237e3c081ed51e4d8a58116f35ad165d2494843d026d9433e5728950d65a7d89
-
SSDEEP
98304:EniLf9FdfE0pZB156utgpPFotBER/mQ32lUd:eOl56utgpPF8u/7d
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3416-0-0x00007FF6460A0000-0x00007FF6463F4000-memory.dmp UPX -
XMRig Miner payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3416-0-0x00007FF6460A0000-0x00007FF6463F4000-memory.dmp xmrig behavioral2/memory/3416-1-0x00007FF6460A0000-0x00007FF6463F4000-memory.dmp xmrig -
Processes:
resource yara_rule behavioral2/memory/3416-0-0x00007FF6460A0000-0x00007FF6463F4000-memory.dmp upx