Static task
static1
Behavioral task
behavioral1
Sample
20240910dedaf87d9f14524ec3fe7c3d2e304bf5cobaltstrikehellokitty.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
20240910dedaf87d9f14524ec3fe7c3d2e304bf5cobaltstrikehellokitty.exe
Resource
win10v2004-20240802-en
General
-
Target
20240910dedaf87d9f14524ec3fe7c3d2e304bf5cobaltstrikehellokitty
-
Size
477KB
-
MD5
dedaf87d9f14524ec3fe7c3d2e304bf5
-
SHA1
be8574663f31227d834bf3adc31c386533a7632c
-
SHA256
e22137c5b034e0bf022ee389b607d3e0cffdbb25355918135f1536a7e510442b
-
SHA512
ddde7e1d9ba6c684d1e2a9c5f324e1d294f1f5899e3994f59e3b5a68b3a5c058c01f437ebf147c08c8d8a4308696aa38cbbf62b415e5344d20db02551827afea
-
SSDEEP
3072:OWNV+TSXAtEyDgEws1/gT72ZywWWq/ePVl/uw7cFhpD:OWTASXh6mkWWjzcFLD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 20240910dedaf87d9f14524ec3fe7c3d2e304bf5cobaltstrikehellokitty
Files
-
20240910dedaf87d9f14524ec3fe7c3d2e304bf5cobaltstrikehellokitty.exe windows:5 windows x86 arch:x86
1e6318700f802c378fd14ed1b841cb32
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindNextFileW
FindClose
CreateFileW
GetFileAttributesW
SetFileAttributesW
GetLastError
LoadLibraryW
GetProcAddress
lstrcmpW
GetCurrentThreadId
GetCurrentProcessId
SystemTimeToFileTime
GetSystemTimeAsFileTime
GetSystemTime
QueryPerformanceCounter
GetCommandLineW
GetCurrentProcess
lstrlenW
SetErrorMode
CreateMutexW
lstrcatA
GetModuleHandleA
GetLogicalDriveStringsW
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
LocalFree
FindFirstFileW
lstrcmpiW
OpenMutexW
GetDriveTypeW
HeapSize
FlushFileBuffers
WriteConsoleW
GetStringTypeW
SetStdHandle
GetProcessHeap
HeapAlloc
HeapReAlloc
HeapFree
MoveFileW
GetTickCount
lstrcpyW
SetFilePointerEx
CloseHandle
InterlockedExchangeAdd
lstrcatW
Sleep
QueueUserWorkItem
lstrcpynW
WriteFile
GetFileSizeEx
FreeEnvironmentStringsW
GetEnvironmentStringsW
DecodePointer
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
LCMapStringW
GetFileType
ExitProcess
ReadFile
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
InitializeSListHead
TerminateProcess
RtlUnwind
RaiseException
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetModuleHandleExW
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
GetStdHandle
GetACP
GetConsoleCP
GetConsoleMode
user32
CharLowerW
wsprintfW
shell32
ShellExecuteW
SHEmptyRecycleBinA
CommandLineToArgvW
ole32
CoSetProxyBlanket
CoCreateInstance
oleaut32
VariantClear
SysAllocString
SysFreeString
VariantInit
shlwapi
PathRemoveBackslashW
StrStrW
StrRStrIW
StrStrIW
wnsprintfA
wnsprintfW
mpr
WNetEnumResourceW
WNetCloseEnum
WNetOpenEnumW
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 77KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.shell Size: 320KB - Virtual size: 320KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ