Analysis
-
max time kernel
93s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 23:13
Behavioral task
behavioral1
Sample
2024-09-18_84b328de69613ad1a8116ac1e09472b7_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-18_84b328de69613ad1a8116ac1e09472b7_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-18_84b328de69613ad1a8116ac1e09472b7_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
6.1MB
-
MD5
84b328de69613ad1a8116ac1e09472b7
-
SHA1
935f3608779ab51811d68688d0a2802404fddf87
-
SHA256
dc91600b718133655632e895e3f096b62c8611c3f9a9f4fbc93f2a86489bd647
-
SHA512
a7e4eb07ab4aeba05662f7bd505150fb0c351f12074dcea17160408812acaff4e050f683ee96eeab0223cf678a8a80887d900637c244e8dca72807f222c9c44a
-
SSDEEP
98304:IapSdlWdfE0pZPD56utgpPFotBER/mQ32lUZ:32Y56utgpPF8u/7Z
Malware Config
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
resource yara_rule behavioral2/memory/4152-0-0x00007FF62FDF0000-0x00007FF630144000-memory.dmp upx