Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-06-2024 03:54
Behavioral task
behavioral1
Sample
2024-06-26_8b252f404a7d085a3b105677d5a5e205_cobalt-strike_cobaltstrike_poet-rat.exe
Resource
win7-20240611-en
11 signatures
150 seconds
General
-
Target
2024-06-26_8b252f404a7d085a3b105677d5a5e205_cobalt-strike_cobaltstrike_poet-rat.exe
-
Size
6.0MB
-
MD5
8b252f404a7d085a3b105677d5a5e205
-
SHA1
34cd851b0637240568e37bbc341d4850271825fa
-
SHA256
857335fe0b64a6e00acab80adf57b2318162e408810409c5e89c7dbfb5ad796c
-
SHA512
58ec42ec90d7deac5af9b518bec39f34575f0fd3ec2d995a4e6c0ee06ce04956c4c46d7335fd1a9e01c021cb15045733c8028bd3f053a58ded485cf22652a0dd
-
SSDEEP
98304:EniLf9FdfE0pZB156utgpPFotBER/mQ32lUA:eOl56utgpPF8u/7A
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1296-0-0x00007FF7643C0000-0x00007FF764714000-memory.dmp UPX -
XMRig Miner payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1296-0-0x00007FF7643C0000-0x00007FF764714000-memory.dmp xmrig -
Processes:
resource yara_rule behavioral2/memory/1296-0-0x00007FF7643C0000-0x00007FF764714000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1296-0-0x00007FF7643C0000-0x00007FF764714000-memory.dmpFilesize
3.3MB