Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2024 07:43

General

  • Target

    2024-12-30_0f9eabd65f3ca2fd65c258b5720234df_cobalt-strike_cobaltstrike_poet-rat.exe

  • Size

    6.0MB

  • MD5

    0f9eabd65f3ca2fd65c258b5720234df

  • SHA1

    a16e8c49e743c27a5a2ca14abc951cbe006ab39d

  • SHA256

    5f676dd1651ebd17f416b1417e1db79f963c488bef4182c4c9cff08f36cea187

  • SHA512

    ad33b2d9868a7123f0fea2801c18375fa327ac43f8e3c38a9522e633c02d4022c3ed3ba16f7178d074378518c559364241f9a7099aad5ade26f6b4dbb44672f7

  • SSDEEP

    98304:EniLf9FdfE0pZB156utgpPFotBER/mQ32lUL:eOl56utgpPF8u/7L

Malware Config

Signatures

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Cobaltstrike family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-12-30_0f9eabd65f3ca2fd65c258b5720234df_cobalt-strike_cobaltstrike_poet-rat.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-12-30_0f9eabd65f3ca2fd65c258b5720234df_cobalt-strike_cobaltstrike_poet-rat.exe"
    1⤵
      PID:396

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/396-0-0x00007FF627770000-0x00007FF627AC4000-memory.dmp

      Filesize

      3.3MB

    • memory/396-1-0x00007FF627770000-0x00007FF627AC4000-memory.dmp

      Filesize

      3.3MB