Analysis
-
max time kernel
131s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 01:22
Behavioral task
behavioral1
Sample
2024-05-20_7bb960cebd8d41f65350b7a4b366986e_cobalt-strike_cobaltstrike.exe
Resource
win7-20240221-en
windows7-x64
11 signatures
150 seconds
General
-
Target
2024-05-20_7bb960cebd8d41f65350b7a4b366986e_cobalt-strike_cobaltstrike.exe
-
Size
6.0MB
-
MD5
7bb960cebd8d41f65350b7a4b366986e
-
SHA1
4aa7861f5802d2ebe03ea468a79c266100e2e3ce
-
SHA256
788c783ec156bd1a3951d28dfc96f503853c2144536b9d78731b78b2465907da
-
SHA512
4e0d837c7fedba786ac9c6e5cd9ee56b443f655acef88223c48441a235727ebc10b1fefa131481dd609daa2d97153dd7be31dfcb8461ef493c90751af4507bf2
-
SSDEEP
98304:EniLf9FdfE0pZB156utgpPFotBER/mQ32lUr:eOl56utgpPF8u/7r
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1852-0-0x00007FF620BD0000-0x00007FF620F24000-memory.dmp UPX -
XMRig Miner payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1852-0-0x00007FF620BD0000-0x00007FF620F24000-memory.dmp xmrig -
Processes:
resource yara_rule behavioral2/memory/1852-0-0x00007FF620BD0000-0x00007FF620F24000-memory.dmp upx