Source: VBqmdl6ttr.exe, 00000000.00000002.2734346887.000001D7C93F0000.00000020.10000000.00040000.00000000.sdmp | String found in binary or memory: http://127.0.0.1:%u/ |
Source: VBqmdl6ttr.exe, 00000000.00000003.2096130665.000001D7C94A4000.00000004.00000020.00020000.00000000.sdmp, VBqmdl6ttr.exe, 00000000.00000003.2094602387.000001D7C94A4000.00000004.00000020.00020000.00000000.sdmp, VBqmdl6ttr.exe, 00000000.00000003.2095890747.000001D7C94A4000.00000004.00000020.00020000.00000000.sdmp, VBqmdl6ttr.exe, 00000000.00000003.1492910943.000001D7C94A4000.00000004.00000020.00020000.00000000.sdmp, VBqmdl6ttr.exe, 00000000.00000002.2734382612.000001D7C944C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.25.126.96/ |
Source: VBqmdl6ttr.exe, 00000000.00000003.2096130665.000001D7C94A4000.00000004.00000020.00020000.00000000.sdmp, VBqmdl6ttr.exe, 00000000.00000003.2094602387.000001D7C94A4000.00000004.00000020.00020000.00000000.sdmp, VBqmdl6ttr.exe, 00000000.00000003.2095890747.000001D7C94A4000.00000004.00000020.00020000.00000000.sdmp, VBqmdl6ttr.exe, 00000000.00000003.1492910943.000001D7C94A4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.25.126.96/4 |
Source: VBqmdl6ttr.exe, 00000000.00000003.2118756330.000001D7C94A4000.00000004.00000020.00020000.00000000.sdmp, VBqmdl6ttr.exe, 00000000.00000002.2734382612.000001D7C944C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.25.126.96/6 |
Source: VBqmdl6ttr.exe, 00000000.00000002.2734382612.000001D7C9457000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.25.126.96/cm |
Source: VBqmdl6ttr.exe, 00000000.00000002.2734382612.000001D7C94A4000.00000004.00000020.00020000.00000000.sdmp, VBqmdl6ttr.exe, 00000000.00000003.2096130665.000001D7C94A4000.00000004.00000020.00020000.00000000.sdmp, VBqmdl6ttr.exe, 00000000.00000003.2418998322.000001D7C94A4000.00000004.00000020.00020000.00000000.sdmp, VBqmdl6ttr.exe, 00000000.00000003.2094602387.000001D7C94A4000.00000004.00000020.00020000.00000000.sdmp, VBqmdl6ttr.exe, 00000000.00000003.2118756330.000001D7C94A4000.00000004.00000020.00020000.00000000.sdmp, VBqmdl6ttr.exe, 00000000.00000003.2095890747.000001D7C94A4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.25.126.96/cmD |
Source: VBqmdl6ttr.exe, 00000000.00000002.2734382612.000001D7C94CB000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.25.126.96/cmf |
Source: VBqmdl6ttr.exe, 00000000.00000003.2096130665.000001D7C94A4000.00000004.00000020.00020000.00000000.sdmp, VBqmdl6ttr.exe, 00000000.00000003.2094602387.000001D7C94A4000.00000004.00000020.00020000.00000000.sdmp, VBqmdl6ttr.exe, 00000000.00000003.2095890747.000001D7C94A4000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.25.126.96/cmr |
Source: VBqmdl6ttr.exe, 00000000.00000002.2734382612.000001D7C944C000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.25.126.96/m |
Source: VBqmdl6ttr.exe, 00000000.00000002.2734382612.000001D7C94C2000.00000004.00000020.00020000.00000000.sdmp, VBqmdl6ttr.exe, 00000000.00000002.2734382612.000001D7C9457000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://20.25.126.96:443/cm |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Identifies CobaltStrike via unidentified function code Author: unknown |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Meterpreter Beacon - file K5om.dll Author: Florian Roth |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Cobalt Strike sample from Leviathan report Author: Florian Roth |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Cobalt Strike loader Author: @VK_Intel |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: CobaltStrike payload Author: ditekSHen |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.unpack, type: UNPACKEDPE | Matched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.unpack, type: UNPACKEDPE | Matched rule: Identifies CobaltStrike via unidentified function code Author: unknown |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Meterpreter Beacon - file K5om.dll Author: Florian Roth |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.unpack, type: UNPACKEDPE | Matched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Cobalt Strike sample from Leviathan report Author: Florian Roth |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.unpack, type: UNPACKEDPE | Matched rule: Detects Cobalt Strike loader Author: @VK_Intel |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.unpack, type: UNPACKEDPE | Matched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.unpack, type: UNPACKEDPE | Matched rule: CobaltStrike payload Author: ditekSHen |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.unpack, type: UNPACKEDPE | Matched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.unpack, type: UNPACKEDPE | Matched rule: Identifies CobaltStrike via unidentified function code Author: unknown |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.unpack, type: UNPACKEDPE | Matched rule: Detects Meterpreter Beacon - file K5om.dll Author: Florian Roth |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.unpack, type: UNPACKEDPE | Matched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.unpack, type: UNPACKEDPE | Matched rule: Detects Cobalt Strike sample from Leviathan report Author: Florian Roth |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.unpack, type: UNPACKEDPE | Matched rule: Detects Cobalt Strike loader Author: @VK_Intel |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.unpack, type: UNPACKEDPE | Matched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.unpack, type: UNPACKEDPE | Matched rule: detects Reflective DLL injection artifacts Author: ditekSHen |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.unpack, type: UNPACKEDPE | Matched rule: CobaltStrike payload Author: ditekSHen |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Identifies CobaltStrike via unidentified function code Author: unknown |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Meterpreter Beacon - file K5om.dll Author: Florian Roth |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Cobalt Strike sample from Leviathan report Author: Florian Roth |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects Cobalt Strike loader Author: @VK_Intel |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: detects Reflective DLL injection artifacts Author: ditekSHen |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: CobaltStrike payload Author: ditekSHen |
Source: 00000000.00000002.2734809483.000001D7C96A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown |
Source: 00000000.00000002.2734809483.000001D7C96A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Identifies CobaltStrike via unidentified function code Author: unknown |
Source: 00000000.00000002.2734809483.000001D7C96A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Meterpreter Beacon - file K5om.dll Author: Florian Roth |
Source: 00000000.00000002.2734809483.000001D7C96A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net |
Source: 00000000.00000002.2734809483.000001D7C96A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Cobalt Strike sample from Leviathan report Author: Florian Roth |
Source: 00000000.00000002.2734809483.000001D7C96A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects Cobalt Strike loader Author: @VK_Intel |
Source: 00000000.00000002.2734809483.000001D7C96A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth |
Source: 00000000.00000002.2734809483.000001D7C96A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: CobaltStrike payload Author: ditekSHen |
Source: 00000000.00000002.2734346887.000001D7C93F0000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown |
Source: 00000000.00000002.2734346887.000001D7C93F0000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Identifies CobaltStrike via unidentified function code Author: unknown |
Source: 00000000.00000002.2734346887.000001D7C93F0000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects Meterpreter Beacon - file K5om.dll Author: Florian Roth |
Source: 00000000.00000002.2734346887.000001D7C93F0000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net |
Source: 00000000.00000002.2734346887.000001D7C93F0000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects Cobalt Strike sample from Leviathan report Author: Florian Roth |
Source: 00000000.00000002.2734346887.000001D7C93F0000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects Cobalt Strike loader Author: @VK_Intel |
Source: 00000000.00000002.2734346887.000001D7C93F0000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth |
Source: 00000000.00000002.2734346887.000001D7C93F0000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: detects Reflective DLL injection artifacts Author: ditekSHen |
Source: 00000000.00000002.2734346887.000001D7C93F0000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: CobaltStrike payload Author: ditekSHen |
Source: Process Memory Space: VBqmdl6ttr.exe PID: 5536, type: MEMORYSTR | Matched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown |
Source: Process Memory Space: VBqmdl6ttr.exe PID: 5536, type: MEMORYSTR | Matched rule: Detects unmodified CobaltStrike beacon DLL Author: yara@s3c.za.net |
Source: Process Memory Space: VBqmdl6ttr.exe PID: 5536, type: MEMORYSTR | Matched rule: Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip Author: Florian Roth |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C9421840 | 0_2_000001D7C9421840 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C9421858 | 0_2_000001D7C9421858 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C9400874 | 0_2_000001D7C9400874 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C9421818 | 0_2_000001D7C9421818 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C941D820 | 0_2_000001D7C941D820 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C9421828 | 0_2_000001D7C9421828 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C9421830 | 0_2_000001D7C9421830 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C94218B8 | 0_2_000001D7C94218B8 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C94218C0 | 0_2_000001D7C94218C0 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C94148E0 | 0_2_000001D7C94148E0 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C9421898 | 0_2_000001D7C9421898 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C9407FB8 | 0_2_000001D7C9407FB8 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C94217B8 | 0_2_000001D7C94217B8 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C94217C0 | 0_2_000001D7C94217C0 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C941BFE0 | 0_2_000001D7C941BFE0 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C9421798 | 0_2_000001D7C9421798 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C94217A0 | 0_2_000001D7C94217A0 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C94217A8 | 0_2_000001D7C94217A8 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C9411A88 | 0_2_000001D7C9411A88 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C941214C | 0_2_000001D7C941214C |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C93F916C | 0_2_000001D7C93F916C |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C9407474 | 0_2_000001D7C9407474 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C9414BFC | 0_2_000001D7C9414BFC |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C9416414 | 0_2_000001D7C9416414 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C9414C18 | 0_2_000001D7C9414C18 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C9410C34 | 0_2_000001D7C9410C34 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C9412C9C | 0_2_000001D7C9412C9C |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C941B370 | 0_2_000001D7C941B370 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C941CBC7 | 0_2_000001D7C941CBC7 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C93FCE40 | 0_2_000001D7C93FCE40 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C940FE70 | 0_2_000001D7C940FE70 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C941EE30 | 0_2_000001D7C941EE30 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C93F9680 | 0_2_000001D7C93F9680 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C941CEB0 | 0_2_000001D7C941CEB0 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C96B8074 | 0_2_000001D7C96B8074 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C96C1834 | 0_2_000001D7C96C1834 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C96C7014 | 0_2_000001D7C96C7014 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C96C389C | 0_2_000001D7C96C389C |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C96CBF70 | 0_2_000001D7C96CBF70 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C96CD7C7 | 0_2_000001D7C96CD7C7 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C96C0A70 | 0_2_000001D7C96C0A70 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C96ADA40 | 0_2_000001D7C96ADA40 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C96CFA30 | 0_2_000001D7C96CFA30 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C96CDAB0 | 0_2_000001D7C96CDAB0 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C96AA280 | 0_2_000001D7C96AA280 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C96B1474 | 0_2_000001D7C96B1474 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C96CE420 | 0_2_000001D7C96CE420 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C96CCBE0 | 0_2_000001D7C96CCBE0 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C96B8BB8 | 0_2_000001D7C96B8BB8 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C96C2688 | 0_2_000001D7C96C2688 |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C96A9D6C | 0_2_000001D7C96A9D6C |
Source: C:\Users\user\Desktop\VBqmdl6ttr.exe | Code function: 0_2_000001D7C96C2D4C | 0_2_000001D7C96C2D4C |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23 |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17 |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Beacon_K5om date = 2017-06-07, hash1 = e3494fd2cc7e9e02cff76841630892e4baed34a3e1ef2b9ae4e2608f9a4d7be9, author = Florian Roth, description = Detects Meterpreter Beacon - file K5om.dll, reference = https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: Leviathan_CobaltStrike_Sample_1 date = 2017-10-18, hash1 = 5860ddc428ffa900258207e9c385f843a3472f2fbf252d2f6357d458646cf362, author = Florian Roth, description = Detects Cobalt Strike sample from Leviathan report, reference = https://goo.gl/MZ7dRg, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: crime_win32_csbeacon_1 date = 2020-03-16, author = @VK_Intel, description = Detects Cobalt Strike loader, reference = https://twitter.com/VK_Intel/status/1239632822358474753 |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_CobaltStrike author = ditekSHen, description = CobaltStrike payload |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23 |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17 |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.unpack, type: UNPACKEDPE | Matched rule: Beacon_K5om date = 2017-06-07, hash1 = e3494fd2cc7e9e02cff76841630892e4baed34a3e1ef2b9ae4e2608f9a4d7be9, author = Florian Roth, description = Detects Meterpreter Beacon - file K5om.dll, reference = https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.unpack, type: UNPACKEDPE | Matched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.unpack, type: UNPACKEDPE | Matched rule: Leviathan_CobaltStrike_Sample_1 date = 2017-10-18, hash1 = 5860ddc428ffa900258207e9c385f843a3472f2fbf252d2f6357d458646cf362, author = Florian Roth, description = Detects Cobalt Strike sample from Leviathan report, reference = https://goo.gl/MZ7dRg, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.unpack, type: UNPACKEDPE | Matched rule: crime_win32_csbeacon_1 date = 2020-03-16, author = @VK_Intel, description = Detects Cobalt Strike loader, reference = https://twitter.com/VK_Intel/status/1239632822358474753 |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.unpack, type: UNPACKEDPE | Matched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_CobaltStrike author = ditekSHen, description = CobaltStrike payload |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23 |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17 |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.unpack, type: UNPACKEDPE | Matched rule: Beacon_K5om date = 2017-06-07, hash1 = e3494fd2cc7e9e02cff76841630892e4baed34a3e1ef2b9ae4e2608f9a4d7be9, author = Florian Roth, description = Detects Meterpreter Beacon - file K5om.dll, reference = https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.unpack, type: UNPACKEDPE | Matched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.unpack, type: UNPACKEDPE | Matched rule: Leviathan_CobaltStrike_Sample_1 date = 2017-10-18, hash1 = 5860ddc428ffa900258207e9c385f843a3472f2fbf252d2f6357d458646cf362, author = Florian Roth, description = Detects Cobalt Strike sample from Leviathan report, reference = https://goo.gl/MZ7dRg, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.unpack, type: UNPACKEDPE | Matched rule: crime_win32_csbeacon_1 date = 2020-03-16, author = @VK_Intel, description = Detects Cobalt Strike loader, reference = https://twitter.com/VK_Intel/status/1239632822358474753 |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.unpack, type: UNPACKEDPE | Matched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts |
Source: 0.2.VBqmdl6ttr.exe.1d7c96a0000.1.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_CobaltStrike author = ditekSHen, description = CobaltStrike payload |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23 |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17 |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Beacon_K5om date = 2017-06-07, hash1 = e3494fd2cc7e9e02cff76841630892e4baed34a3e1ef2b9ae4e2608f9a4d7be9, author = Florian Roth, description = Detects Meterpreter Beacon - file K5om.dll, reference = https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: Leviathan_CobaltStrike_Sample_1 date = 2017-10-18, hash1 = 5860ddc428ffa900258207e9c385f843a3472f2fbf252d2f6357d458646cf362, author = Florian Roth, description = Detects Cobalt Strike sample from Leviathan report, reference = https://goo.gl/MZ7dRg, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: crime_win32_csbeacon_1 date = 2020-03-16, author = @VK_Intel, description = Detects Cobalt Strike loader, reference = https://twitter.com/VK_Intel/status/1239632822358474753 |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts |
Source: 0.2.VBqmdl6ttr.exe.1d7c93f0000.0.raw.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_CobaltStrike author = ditekSHen, description = CobaltStrike payload |
Source: 00000000.00000002.2734809483.000001D7C96A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23 |
Source: 00000000.00000002.2734809483.000001D7C96A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17 |
Source: 00000000.00000002.2734809483.000001D7C96A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Beacon_K5om date = 2017-06-07, hash1 = e3494fd2cc7e9e02cff76841630892e4baed34a3e1ef2b9ae4e2608f9a4d7be9, author = Florian Roth, description = Detects Meterpreter Beacon - file K5om.dll, reference = https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000000.00000002.2734809483.000001D7C96A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL |
Source: 00000000.00000002.2734809483.000001D7C96A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Leviathan_CobaltStrike_Sample_1 date = 2017-10-18, hash1 = 5860ddc428ffa900258207e9c385f843a3472f2fbf252d2f6357d458646cf362, author = Florian Roth, description = Detects Cobalt Strike sample from Leviathan report, reference = https://goo.gl/MZ7dRg, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000000.00000002.2734809483.000001D7C96A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: crime_win32_csbeacon_1 date = 2020-03-16, author = @VK_Intel, description = Detects Cobalt Strike loader, reference = https://twitter.com/VK_Intel/status/1239632822358474753 |
Source: 00000000.00000002.2734809483.000001D7C96A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000000.00000002.2734809483.000001D7C96A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_CobaltStrike author = ditekSHen, description = CobaltStrike payload |
Source: 00000000.00000002.2734346887.000001D7C93F0000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23 |
Source: 00000000.00000002.2734346887.000001D7C93F0000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17 |
Source: 00000000.00000002.2734346887.000001D7C93F0000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Beacon_K5om date = 2017-06-07, hash1 = e3494fd2cc7e9e02cff76841630892e4baed34a3e1ef2b9ae4e2608f9a4d7be9, author = Florian Roth, description = Detects Meterpreter Beacon - file K5om.dll, reference = https://www.fireeye.com/blog/threat-research/2017/06/phished-at-the-request-of-counsel.html, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000000.00000002.2734346887.000001D7C93F0000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL |
Source: 00000000.00000002.2734346887.000001D7C93F0000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: Leviathan_CobaltStrike_Sample_1 date = 2017-10-18, hash1 = 5860ddc428ffa900258207e9c385f843a3472f2fbf252d2f6357d458646cf362, author = Florian Roth, description = Detects Cobalt Strike sample from Leviathan report, reference = https://goo.gl/MZ7dRg, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000000.00000002.2734346887.000001D7C93F0000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: crime_win32_csbeacon_1 date = 2020-03-16, author = @VK_Intel, description = Detects Cobalt Strike loader, reference = https://twitter.com/VK_Intel/status/1239632822358474753 |
Source: 00000000.00000002.2734346887.000001D7C93F0000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/ |
Source: 00000000.00000002.2734346887.000001D7C93F0000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts |
Source: 00000000.00000002.2734346887.000001D7C93F0000.00000020.10000000.00040000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_CobaltStrike author = ditekSHen, description = CobaltStrike payload |
Source: Process Memory Space: VBqmdl6ttr.exe PID: 5536, type: MEMORYSTR | Matched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23 |
Source: Process Memory Space: VBqmdl6ttr.exe PID: 5536, type: MEMORYSTR | Matched rule: CobaltStrike_Unmodifed_Beacon date = 2019-08-16, author = yara@s3c.za.net, description = Detects unmodified CobaltStrike beacon DLL |
Source: Process Memory Space: VBqmdl6ttr.exe PID: 5536, type: MEMORYSTR | Matched rule: WiltedTulip_ReflectiveLoader date = 2017-07-23, hash5 = eee430003e7d59a431d1a60d45e823d4afb0d69262cc5e0c79f345aa37333a89, hash4 = cf7c754ceece984e6fa0d799677f50d93133db609772c7a2226e7746e6d046f0, hash3 = a159a9bfb938de686f6aced37a2f7fa62d6ff5e702586448884b70804882b32f, hash2 = 1f52d643e8e633026db73db55eb1848580de00a203ee46263418f02c6bdb8c7a, hash1 = 1097bf8f5b832b54c81c1708327a54a88ca09f7bdab4571f1a335cc26bbd7904, author = Florian Roth, description = Detects reflective loader (Cobalt Strike) used in Operation Wilted Tulip, reference = http://www.clearskysec.com/tulip, license = https://creativecommons.org/licenses/by-nc/4.0/ |