Report Overview

  1. Submitted URL

    www.huntress.com/blog/cobalt-strike-analysis-of-obfuscated-malware

  2. IP

    63.35.51.142

    ASN

    #16509 AMAZON-02

  3. Submitted

    2024-05-07 08:14:24

    Access

    public

  4. Website Title

    Cobalt Strikes Again: An Analysis of Obfuscated Malware

  5. Final URL

    www.huntress.com/blog/cobalt-strike-analysis-of-obfuscated-malware

  6. Tags

  7. urlquery detections

    No alerts detected

Detections

  1. urlquery

    0

  2. Network Intrusion Detection

    0

  3. Threat Detection Systems

    2

Domain Summary

Domain / FQDNRankRegisteredFirst SeenLast Seen
js.hsadspixel.net37952017-04-212017-07-252024-05-06
js.driftt.com57532013-10-312018-06-142024-05-06
region1.analytics.google.comunknown1997-09-152022-03-172024-05-05
bat.bing.com3871996-01-292014-04-082024-05-05
bootstrap.api.drift.com65171995-04-152020-08-262024-03-25
a.quora.com75682000-03-292017-05-082024-05-06
d3e54v103j8qbb.cloudfront.netunknown2008-04-252016-03-112024-05-06
cdn.jsdelivr.net4392012-05-162012-09-302024-05-06
www.googletagmanager.com752011-11-112013-05-222024-05-07
js.hsleadflows.net46092017-01-232017-02-222024-05-06
ipv6.6sc.counknown2014-12-122022-05-052024-05-06
epsilon.6sense.com142081998-07-172018-10-102024-05-06
www.huntress.comunknown1996-06-072015-05-142024-02-27
b.6sc.co61872014-12-122015-12-152024-05-05
www.google.no256072001-02-262016-04-052024-05-06
tracking.g2crowd.com95692012-08-202016-10-092024-05-03
trk.techtarget.com133481999-09-152019-03-032024-05-03
tools.refokus.comunknown2016-10-312022-03-152024-04-23
5092804-4.chat.api.drift.comunknown1995-04-152023-09-172024-02-28
location.services.mozilla.com67711994-10-182014-06-012024-05-06
www.redditstatic.com14402011-11-092012-06-302024-05-06
www.gstatic.comunknown2008-02-112016-07-262024-05-06
fonts.gstatic.comunknown2008-02-112014-09-092024-05-07
j.6sc.co82372014-12-122015-12-102024-05-06
js.hs-scripts.com25712016-07-112016-08-092024-05-06
huntresscdn.comunknown2022-05-212022-05-212024-02-28
js.hscollectedforms.net56972017-01-232017-03-022024-05-06
js.hs-banner.com24262020-03-092020-03-262024-05-06
www.google.com71997-09-152015-05-102024-03-23
metrics.api.drift.com62351995-04-152018-08-072024-05-03
hubspotonwebflow.comunknown2023-08-242023-08-242024-05-03
presence.api.drift.com59011995-04-152019-04-222024-05-06
forms.hscollectedforms.netunknown2017-01-232023-03-022024-05-06
event.api.drift.com72381995-04-152016-08-042024-05-06
js.zi-scripts.comunknown2022-08-232022-12-012024-05-06
assets.website-files.com135522019-01-232020-11-012024-05-06
forms.hsforms.com51602013-09-182018-03-072024-05-06
google.com11997-09-152013-10-022024-04-30
rc-widget-frame.js.driftt.comunknown2013-10-312023-08-252024-03-25
cdn.neverbounce.com1188092014-05-192018-09-162024-04-23
ibc-flow.techtarget.comunknown1999-09-152021-10-022024-04-26
api.neverbounce.com638132014-05-192015-04-022024-03-08
assets-global.website-files.com140272019-01-232020-11-012024-05-06
client-registry.mutinycdn.com372532019-02-202019-02-282024-05-04
js.na.chilipiper.com4163452014-12-222021-10-082024-02-27
q.quora.com32392000-03-292017-05-082024-05-06
c.6sc.co121502014-12-122017-01-302024-05-06

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumwww.huntress.com/blog/cobalt-strike-analysis-of-obfuscated-malwareDetect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen

OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


JavaScript (104)

HTTP Transactions (204)

URLIPResponseSize
www.huntress.com/blog/cobalt-strike-analysis-of-obfuscated-malware
52.17.119.105200 OK33 kB
assets-global.website-files.com/6579dd0b5f9a54376d296915/css/huntress-new.c85951d37.min.css
3.164.240.122200 OK62 kB
assets-global.website-files.com/6579dd0b5f9a54376d296915%2F6470f5217e03b0faa8a404de%2F658a9a0642f212b4ef59b0b2%2Fhs_trackcode_3911692-1.0.6.js
3.164.240.122 131 B
assets-global.website-files.com/655d92689c415e9fefcf2368/655d92689c415e9fefcf2400_Hero-grapic-right-02.png
3.164.240.122 5.0 kB
assets-global.website-files.com/6579dd0b5f9a54376d296915/65f75020c99f25928927347f_banner-blue-halo.webp
3.164.240.122200 OK24 kB
assets-global.website-files.com/6579dd0b5f9a54376d296915/66267cd1946bdc414612a045_banner-blue-halo-mobile.webp
3.164.240.122 11 kB
cdn.jsdelivr.net/npm/@finsweet/attributes-richtext@1/richtext.js
151.101.193.229200 OK3.9 kB
assets-global.website-files.com/6579dd0b5f9a54376d296915/6579dd0b5f9a54376d296a70_linkedin.svg
3.164.240.122200 OK675 B
assets-global.website-files.com/6579dd0b5f9a54376d296915/6579dd0b5f9a54376d296a5b_facebook.svg
3.164.240.122200 OK368 B
cdn.jsdelivr.net/npm/medium-zoom@1.0.3/dist/medium-zoom.min.js
151.101.193.229200 OK3.1 kB
assets-global.website-files.com/6579dd0b5f9a54376d296915/6579dd0b5f9a54376d296a6f_twitter.svg
3.164.240.122 351 B
cdn.jsdelivr.net/npm/slick-carousel@1.8.1/slick/slick.min.js
151.101.193.229200 OK11 kB
assets-global.website-files.com/6579dd0b5f9a54376d296939/6579dd0b5f9a54376d2970bf_Run%2520Key.png
3.164.240.122 71 kB
assets-global.website-files.com/6579dd0b5f9a54376d296939/6579dd0b5f9a54376d2970b2_Dynamic%2520Analysis.png
3.164.240.122200 OK103 kB
cdn.jsdelivr.net/npm/@snowplow/browser-plugin-button-click-tracking@latest/dist/index.umd.min.js
151.101.193.229200 OK2.0 kB
assets-global.website-files.com/6579dd0b5f9a54376d296939/6579dd0b5f9a54376d2970b1_Debugger3.png
3.164.240.122200 OK67 kB
cdn.jsdelivr.net/npm/slick-carousel@1.8.1/slick/slick.css
151.101.193.229200 OK1.8 kB
client-registry.mutinycdn.com/personalize/client/c9c27905c1e445d6.js
151.101.129.91200 OK17 kB
assets-global.website-files.com/6579dd0b5f9a54376d296939/6579dd0b5f9a54376d2970b7_Second%2520Binary.png
3.164.240.122200 OK478 kB
assets-global.website-files.com/6579dd0b5f9a54376d296939/6579dd0b5f9a54376d2970b4_Binary%25204_6.png
3.164.240.122200 OK82 kB
assets-global.website-files.com/6579dd0b5f9a54376d296939/6579dd0b5f9a54376d2970c1_IOC_7.png
3.164.240.122200 OK216 kB
assets-global.website-files.com/6579dd0b5f9a54376d296939/6579dd0b5f9a54376d2970bb_Screen%2520Shot%25202021-05-20%2520at%25205-23-44%2520PM-png.png
3.164.240.122200 OK75 kB
assets-global.website-files.com/6579dd0b5f9a54376d296915/js/huntress-new.c43690333.js
3.164.240.122 214 kB
assets-global.website-files.com/6579dd0b5f9a54376d296939/6579dd0b5f9a54376d2970c5_IOC_3.png
3.164.240.122200 OK472 kB
assets-global.website-files.com/6579dd0b5f9a54376d296939/6579dd0b5f9a54376d2970b3_continued%2520browsing.png
3.164.240.122200 OK137 kB
assets-global.website-files.com/6579dd0b5f9a54376d296939/6579dd0b5f9a54376d2970b5_Obfuscated.png
3.164.240.122200 OK233 kB
assets-global.website-files.com/6579dd0b5f9a54376d296939/6579dd0b5f9a54376d2970ca_Binary%25204_4.png
3.164.240.122200 OK165 kB
assets-global.website-files.com/6579dd0b5f9a54376d296939/6579dd0b5f9a54376d2970b6_Traffic.png
3.164.240.122200 OK113 kB
j.6sc.co/j/8769192b-20ba-4df2-8d62-2740a805c3e8.js
95.101.10.131200 OK510 B
js.na.chilipiper.com/marketing.js
34.111.224.162200 OK22 kB
assets-global.website-files.com/6579dd0b5f9a54376d296939/6579dd0b5f9a54376d2970c3_IOC_6.png
3.164.240.122200 OK396 kB
assets-global.website-files.com/6579dd0b5f9a54376d296915/6579dd0b5f9a54376d296a5a_download.svg
3.164.240.122 820 B
assets-global.website-files.com/6579dd0b5f9a54376d296915/6579dd0b5f9a54376d296a87_Blog%20detail%20Banner%20Glitch%20Left%20Bottom.webp
3.164.240.122200 OK6.8 kB
assets-global.website-files.com/6579dd0b5f9a54376d296915/6579dd0b5f9a54376d296a71_Blog%20banner%20Thumb%20Glitch%20Left.webp
3.164.240.122200 OK2.0 kB
assets-global.website-files.com/6579dd0b5f9a54376d296939/6579dd0b5f9a54376d2970c9_IOC_8.png
3.164.240.122200 OK431 kB
assets-global.website-files.com/6579dd0b5f9a54376d296939/6579dd0b5f9a54376d2970ba_Delphi.png
3.164.240.122200 OK464 kB
assets-global.website-files.com/6579dd0b5f9a54376d296939/6579dd0b5f9a54376d2970c7_Binary%25205_2.png
3.164.240.122200 OK492 kB
assets-global.website-files.com/6579dd0b5f9a54376d296939/6579dd0b5f9a54376d2970c4_IOC_9.png
3.164.240.122200 OK550 kB
assets-global.website-files.com/6579dd0b5f9a54376d296939/6579dd0b5f9a54376d2970b9_Binary%2520File%25201.png
3.164.240.122 489 kB
assets-global.website-files.com/6579dd0b5f9a54376d296939/6579dd0b5f9a54376d2970b8_Binary4_2.png
3.164.240.122200 OK162 kB
assets-global.website-files.com/6579dd0b5f9a54376d296939/6579dd0b5f9a54376d2970be_Values.png
3.164.240.122 359 kB
assets-global.website-files.com/6579dd0b5f9a54376d296939/6579dd0b5f9a54376d2970bd_Binary%25205_1.png
3.164.240.122200 OK440 kB
assets-global.website-files.com/6579dd0b5f9a54376d296939/6579dd0b5f9a54376d2970c6_Binary%25204_5.png
3.164.240.122200 OK534 kB
assets-global.website-files.com/6579dd0b5f9a54376d296939/6579dd0b5f9a54376d2970c0_Debugger5.png
3.164.240.122200 OK373 kB
j.6sc.co/6si.min.js
95.101.10.131200 OK18 kB
client-registry.mutinycdn.com/mutiny-client/4.5.3.4.js
151.101.129.91200 OK2.9 kB
assets-global.website-files.com/6579dd0b5f9a54376d296939/6579dd0b5f9a54376d2970c2_Fourth%2520Binary.png
3.164.240.122200 OK530 kB
js.hs-scripts.com/3911692.js
104.16.140.209200 OK1.2 kB
client-registry.mutinycdn.com/mutiny-client/2.5.3.4.js
151.101.129.91200 OK22 kB
client-registry.mutinycdn.com/personalize/client_data/c9c27905c1e445d6.json
151.101.129.91200 OK2.4 kB
client-registry.mutinycdn.com/mutiny-client/1.5.3.4.js
151.101.129.91200 OK32 kB
client-registry.mutinycdn.com/mutiny-client/6.5.3.4.js
151.101.129.91200 OK5.0 kB
assets.website-files.com/6579dd0b5f9a54376d296915/6579dd0b5f9a54376d29694d_roboto-regular-webfont.woff2
143.204.55.45200 OK19 kB
assets.website-files.com/6579dd0b5f9a54376d296915/6579dd0b5f9a54376d296925_hknova-regular-webfont.woff2
143.204.55.45200 OK18 kB
assets.website-files.com/6579dd0b5f9a54376d296915/6579dd0b5f9a54376d29691d_hknova-bold-webfont.woff2
143.204.55.45 18 kB
assets.website-files.com/6579dd0b5f9a54376d296915/6579dd0b5f9a54376d296961_visuelt-bold-webfont.woff2
143.204.55.45 21 kB
hubspotonwebflow.com/assets/js/form-124.js
76.76.21.61 20 kB
huntresscdn.com/19680a27e88da4a3713af26571b4849096e75d617f2845574af7fd15746256bb.js
104.26.1.173200 OK114 kB
www.googletagmanager.com/gtm.js?id=GTM-TXRTDGW4
142.250.74.168200 OK106 kB
client-registry.mutinycdn.com/personalize/user_data/c9c27905c1e445d6.json?async=false&session_token=78f0abea-4b9c-4feb-938e-b8db9e7ae8cc&token=5737ea4b430c1742&visitor_token=84cd7e98-35aa-431b-bec7-3eeb9a5fb4cd
151.101.129.91200 OK281 B
assets-global.website-files.com/655d92689c415e9fefcf2368/656079b2a6c055ce7d368e61_Secondary%20Text%20CTA%20Black%20(1).svg
3.164.240.122200 OK407 B
assets-global.website-files.com/6579dd0b5f9a54376d296939/660d84628ab92ac79f396cbc_Huntress-Default-Thumbnail-365x274.webp
3.164.240.122200 OK57 kB
tools.refokus.com/rich-text-enhancer/bundle.v1.0.0.js
76.76.21.9200 OK859 B
js.hsleadflows.net/leadflows.js
104.18.140.17200 OK89 kB
ipv6.6sc.co/
23.36.79.19200 OK4 B
js.hscollectedforms.net/collectedforms.js
104.16.109.254 25 kB
b.6sc.co/v1/beacon/img.gif?token=a87a3edc53b5a86d1795d11887b5aa39&svisitor=null&visitor=067a8780-2e3e-47dd-8522-dbe728ebd677&session=ca548964-1314-40bb-8035-d14c2c63a59d&event=ni%3AasyncSettingsAudit&q=%7B%22settings%22%3A%22%5B%7B%5C%22name%5C%22%3A%5C%22setToken%5C%22%2C%5C%22value%5C%22%3A%5C%22a87a3edc53b5a86d1795d11887b5aa39%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Tue%2C%2007%20May%202024%2008%3A13%3A52%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%220%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22disableCookies%5C%22%2C%5C%22value%5C%22%3A%5C%22false%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Tue%2C%2007%20May%202024%2008%3A13%3A52%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%220%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22setEpsilonKey%5C%22%2C%5C%22value%5C%22%3A%5C%22c081b6bcc07a45b013b81ff3441b82387640805c%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Tue%2C%2007%20May%202024%2008%3A13%3A52%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%220%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22enableIPv6Ping%5C%22%2C%5C%22value%5C%22%3A%5C%22true%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Tue%2C%2007%20May%202024%2008%3A13%3A52%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%220%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22enableIgnorePageUrlHash%5C%22%2C%5C%22value%5C%22%3A%5C%22true%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Tue%2C%2007%20May%202024%2008%3A13%3A52%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%220%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22enableRetargeting%5C%22%2C%5C%22value%5C%22%3A%5C%22false%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Tue%2C%2007%20May%202024%2008%3A13%3A52%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%220%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22setWhiteListFields%5C%22%2C%5C%22value%5C%22%3A%5C%22%5B%5D%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Tue%2C%2007%20May%202024%2008%3A13%3A52%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%220%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22setCustomMetatags%5C%22%2C%5C%22value%5C%22%3A%5C%22%5B%5D%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Tue%2C%2007%20May%202024%2008%3A13%3A52%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%220%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22storeTagId%5C%22%2C%5C%22value%5C%22%3A%5C%228769192b-20ba-4df2-8d62-2740a805c3e8%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Tue%2C%2007%20May%202024%2008%3A13%3A52%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%220%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22enableEventTracking%5C%22%2C%5C%22value%5C%22%3A%5C%22true%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Tue%2C%2007%20May%202024%2008%3A13%3A52%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%220%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22setCompanyDetailsExpiration%5C%22%2C%5C%22value%5C%22%3A%5C%22false%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Tue%2C%2007%20May%202024%2008%3A13%3A52%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%220%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22enableMapCookieCapture%5C%22%2C%5C%22value%5C%22%3A%5C%22false%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Tue%2C%2007%20May%202024%2008%3A13%3A52%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%220%5C%22%7D%2C%7B%5C%22name%5C%22%3A%5C%22enableCompanyDetails%5C%22%2C%5C%22value%5C%22%3A%5C%22true%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Tue%2C%2007%20May%202024%2008%3A13%3A52%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%220%5C%22%7D%5D%22%7D&isIframe=false&m=%7B%22description%22%3A%22Join%20us%20for%20a%20threat%20hunting%20adventure%20as%20we%20analyze%20a%20suspicious%20run%20key%20that%20leads%20us%20to%20Cobalt%20Strike%20malware%20hidden%20across%20nearly%20700%20registry%20values.%22%2C%22keywords%22%3A%22%22%2C%22title%22%3A%22Cobalt%20Strikes%20Again%3A%20An%20Analysis%20of%20Obfuscated%20Malware%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&pageViewId=ab2d0d03-41f0-444f-8776-33d4640d035a&webTagId=8769192b-20ba-4df2-8d62-2740a805c3e8&v=1.1.18
95.101.10.131 43 B
js.hs-banner.com/cookie-banner-public/v1/activity/view
104.18.34.229 0 B
www.googletagmanager.com/gtag/js?id=G-GCTMBVFESS&l=dataLayer&cx=c
142.250.74.168200 OK109 kB
www.googletagmanager.com/gtag/destination?id=AW-429191348&l=dataLayer&cx=c
142.250.74.168 89 kB
js.hs-banner.com/cookie-banner-public/v1/activity/view
104.18.34.229 0 B
www.redditstatic.com/ads/pixel.js
151.101.1.140200 OK11 kB
client-registry.mutinycdn.com/mutiny-client/9.5.3.4.js
151.101.129.91 11 kB
client-registry.mutinycdn.com/mutiny-client/7.5.3.4.js
151.101.129.91 2.8 kB
client-registry.mutinycdn.com/mutiny-client/10.5.3.4.js
151.101.129.91 2.6 kB
epsilon.6sense.com/v3/company/details
13.248.142.121200 OK382 B
q.quora.com/_/ad/83f2d51fb0164c438fbdaa8c29ed2e5e/pixel?tag=ViewContent&i=gtm&u=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware
52.2.7.148 43 B
j.6sc.co/j/e666a54d-ff29-48f9-9baa-2be6ac05412e.js
95.101.10.131 438 B
www.redditstatic.com/ads/conversions-config/v1/pixel/config/t2_12z44i_telemetry
151.101.1.140200 OK98 B
js.driftt.com/include/1715069700000/5d3cypit2iz8.js
54.230.111.73200 OK61 kB
j.6sc.co/6si.min.js
95.101.10.131200 OK18 kB
forms.hsforms.com/embed/v3/counters.gif?key=collected-forms-embed-js-form-bind&count=3
104.19.175.188 35 B
c.6sc.co/
23.36.79.9200 OK7 B
ipv6.6sc.co/
23.36.79.19200 OK4 B
ibc-flow.techtarget.com/a/gif.gif?actTypeId=31&cid=17715818&r=1715069632777&ref=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&version=2.4
34.111.208.231200 OK0 B
b.6sc.co/v1/beacon/img.gif?token=a87a3edc53b5a86d1795d11887b5aa39&svisitor=null&visitor=067a8780-2e3e-47dd-8522-dbe728ebd677&session=ca548964-1314-40bb-8035-d14c2c63a59d&event=s_update&q=%7B%22settings%22%3A%22%5B%7B%5C%22name%5C%22%3A%5C%22setToken%5C%22%2C%5C%22value%5C%22%3A%5C%22a87a3edc53b5a86d1795d11887b5aa39%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Tue%2C%2007%20May%202024%2008%3A13%3A52%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%22950%5C%22%7D%5D%22%7D&isIframe=false&m=%7B%22description%22%3A%22Join%20us%20for%20a%20threat%20hunting%20adventure%20as%20we%20analyze%20a%20suspicious%20run%20key%20that%20leads%20us%20to%20Cobalt%20Strike%20malware%20hidden%20across%20nearly%20700%20registry%20values.%22%2C%22keywords%22%3A%22%22%2C%22title%22%3A%22Cobalt%20Strikes%20Again%3A%20An%20Analysis%20of%20Obfuscated%20Malware%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&pageViewId=ab2d0d03-41f0-444f-8776-33d4640d035a&webTagId=8769192b-20ba-4df2-8d62-2740a805c3e8&v=1.1.18
95.101.10.131 43 B
b.6sc.co/v1/beacon/img.gif?token=a87a3edc53b5a86d1795d11887b5aa39&svisitor=null&visitor=067a8780-2e3e-47dd-8522-dbe728ebd677&session=ca548964-1314-40bb-8035-d14c2c63a59d&event=s_update&q=%7B%22settings%22%3A%22%5B%7B%5C%22name%5C%22%3A%5C%22enableIPv6Ping%5C%22%2C%5C%22value%5C%22%3A%5C%22true%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Tue%2C%2007%20May%202024%2008%3A13%3A52%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%22952%5C%22%7D%5D%22%7D&isIframe=false&m=%7B%22description%22%3A%22Join%20us%20for%20a%20threat%20hunting%20adventure%20as%20we%20analyze%20a%20suspicious%20run%20key%20that%20leads%20us%20to%20Cobalt%20Strike%20malware%20hidden%20across%20nearly%20700%20registry%20values.%22%2C%22keywords%22%3A%22%22%2C%22title%22%3A%22Cobalt%20Strikes%20Again%3A%20An%20Analysis%20of%20Obfuscated%20Malware%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&pageViewId=ab2d0d03-41f0-444f-8776-33d4640d035a&webTagId=8769192b-20ba-4df2-8d62-2740a805c3e8&v=1.1.18
95.101.10.131200 OK43 B
b.6sc.co/v1/beacon/img.gif?token=a87a3edc53b5a86d1795d11887b5aa39&svisitor=null&visitor=067a8780-2e3e-47dd-8522-dbe728ebd677&session=ca548964-1314-40bb-8035-d14c2c63a59d&event=s_update&q=%7B%22settings%22%3A%22%5B%7B%5C%22name%5C%22%3A%5C%22disableCookies%5C%22%2C%5C%22value%5C%22%3A%5C%22false%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Tue%2C%2007%20May%202024%2008%3A13%3A52%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%22951%5C%22%7D%5D%22%7D&isIframe=false&m=%7B%22description%22%3A%22Join%20us%20for%20a%20threat%20hunting%20adventure%20as%20we%20analyze%20a%20suspicious%20run%20key%20that%20leads%20us%20to%20Cobalt%20Strike%20malware%20hidden%20across%20nearly%20700%20registry%20values.%22%2C%22keywords%22%3A%22%22%2C%22title%22%3A%22Cobalt%20Strikes%20Again%3A%20An%20Analysis%20of%20Obfuscated%20Malware%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&pageViewId=ab2d0d03-41f0-444f-8776-33d4640d035a&webTagId=8769192b-20ba-4df2-8d62-2740a805c3e8&v=1.1.18
95.101.10.131200 OK43 B
d3e54v103j8qbb.cloudfront.net/js/jquery-3.5.1.min.dc5e7f18c8.js?site=6579dd0b5f9a54376d296915
143.204.42.99200 OK30 kB
b.6sc.co/v1/beacon/img.gif?token=a87a3edc53b5a86d1795d11887b5aa39&svisitor=null&visitor=067a8780-2e3e-47dd-8522-dbe728ebd677&session=ca548964-1314-40bb-8035-d14c2c63a59d&event=s_update&q=%7B%22settings%22%3A%22%5B%7B%5C%22name%5C%22%3A%5C%22setWhiteListFields%5C%22%2C%5C%22value%5C%22%3A%5C%22%5B%5D%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Tue%2C%2007%20May%202024%2008%3A13%3A52%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%22957%5C%22%7D%5D%22%7D&isIframe=false&m=%7B%22description%22%3A%22Join%20us%20for%20a%20threat%20hunting%20adventure%20as%20we%20analyze%20a%20suspicious%20run%20key%20that%20leads%20us%20to%20Cobalt%20Strike%20malware%20hidden%20across%20nearly%20700%20registry%20values.%22%2C%22keywords%22%3A%22%22%2C%22title%22%3A%22Cobalt%20Strikes%20Again%3A%20An%20Analysis%20of%20Obfuscated%20Malware%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&pageViewId=ab2d0d03-41f0-444f-8776-33d4640d035a&webTagId=8769192b-20ba-4df2-8d62-2740a805c3e8&v=1.1.18
95.101.10.131200 OK43 B
b.6sc.co/v1/beacon/img.gif?token=a87a3edc53b5a86d1795d11887b5aa39&svisitor=null&visitor=067a8780-2e3e-47dd-8522-dbe728ebd677&session=ca548964-1314-40bb-8035-d14c2c63a59d&event=s_update&q=%7B%22settings%22%3A%22%5B%7B%5C%22name%5C%22%3A%5C%22setCustomMetatags%5C%22%2C%5C%22value%5C%22%3A%5C%22%5B%5D%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Tue%2C%2007%20May%202024%2008%3A13%3A52%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%22958%5C%22%7D%5D%22%7D&isIframe=false&m=%7B%22description%22%3A%22Join%20us%20for%20a%20threat%20hunting%20adventure%20as%20we%20analyze%20a%20suspicious%20run%20key%20that%20leads%20us%20to%20Cobalt%20Strike%20malware%20hidden%20across%20nearly%20700%20registry%20values.%22%2C%22keywords%22%3A%22%22%2C%22title%22%3A%22Cobalt%20Strikes%20Again%3A%20An%20Analysis%20of%20Obfuscated%20Malware%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&pageViewId=ab2d0d03-41f0-444f-8776-33d4640d035a&webTagId=8769192b-20ba-4df2-8d62-2740a805c3e8&v=1.1.18
95.101.10.131200 OK43 B
b.6sc.co/v1/beacon/img.gif?token=a87a3edc53b5a86d1795d11887b5aa39&svisitor=null&visitor=067a8780-2e3e-47dd-8522-dbe728ebd677&session=ca548964-1314-40bb-8035-d14c2c63a59d&event=s_update&q=%7B%22settings%22%3A%22%5B%7B%5C%22name%5C%22%3A%5C%22setCompanyDetailsExpiration%5C%22%2C%5C%22value%5C%22%3A%5C%22false%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Tue%2C%2007%20May%202024%2008%3A13%3A52%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%22962%5C%22%7D%5D%22%7D&isIframe=false&m=%7B%22description%22%3A%22Join%20us%20for%20a%20threat%20hunting%20adventure%20as%20we%20analyze%20a%20suspicious%20run%20key%20that%20leads%20us%20to%20Cobalt%20Strike%20malware%20hidden%20across%20nearly%20700%20registry%20values.%22%2C%22keywords%22%3A%22%22%2C%22title%22%3A%22Cobalt%20Strikes%20Again%3A%20An%20Analysis%20of%20Obfuscated%20Malware%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&pageViewId=ab2d0d03-41f0-444f-8776-33d4640d035a&webTagId=e666a54d-ff29-48f9-9baa-2be6ac05412e&v=1.1.18
95.101.10.131 43 B
b.6sc.co/v1/beacon/img.gif?token=a87a3edc53b5a86d1795d11887b5aa39&svisitor=null&visitor=067a8780-2e3e-47dd-8522-dbe728ebd677&session=ca548964-1314-40bb-8035-d14c2c63a59d&event=s_update&q=%7B%22settings%22%3A%22%5B%7B%5C%22name%5C%22%3A%5C%22enableIgnorePageUrlHash%5C%22%2C%5C%22value%5C%22%3A%5C%22false%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Tue%2C%2007%20May%202024%2008%3A13%3A52%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%22953%5C%22%7D%5D%22%7D&isIframe=false&m=%7B%22description%22%3A%22Join%20us%20for%20a%20threat%20hunting%20adventure%20as%20we%20analyze%20a%20suspicious%20run%20key%20that%20leads%20us%20to%20Cobalt%20Strike%20malware%20hidden%20across%20nearly%20700%20registry%20values.%22%2C%22keywords%22%3A%22%22%2C%22title%22%3A%22Cobalt%20Strikes%20Again%3A%20An%20Analysis%20of%20Obfuscated%20Malware%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&pageViewId=ab2d0d03-41f0-444f-8776-33d4640d035a&webTagId=8769192b-20ba-4df2-8d62-2740a805c3e8&v=1.1.18
95.101.10.131200 OK43 B
b.6sc.co/v1/beacon/img.gif?token=a87a3edc53b5a86d1795d11887b5aa39&svisitor=null&visitor=067a8780-2e3e-47dd-8522-dbe728ebd677&session=ca548964-1314-40bb-8035-d14c2c63a59d&event=s_update&q=%7B%22settings%22%3A%22%5B%7B%5C%22name%5C%22%3A%5C%22enableRetargeting%5C%22%2C%5C%22value%5C%22%3A%5C%22true%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Tue%2C%2007%20May%202024%2008%3A13%3A52%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%22955%5C%22%7D%5D%22%7D&isIframe=false&m=%7B%22description%22%3A%22Join%20us%20for%20a%20threat%20hunting%20adventure%20as%20we%20analyze%20a%20suspicious%20run%20key%20that%20leads%20us%20to%20Cobalt%20Strike%20malware%20hidden%20across%20nearly%20700%20registry%20values.%22%2C%22keywords%22%3A%22%22%2C%22title%22%3A%22Cobalt%20Strikes%20Again%3A%20An%20Analysis%20of%20Obfuscated%20Malware%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&pageViewId=ab2d0d03-41f0-444f-8776-33d4640d035a&webTagId=8769192b-20ba-4df2-8d62-2740a805c3e8&v=1.1.18
95.101.10.131200 OK43 B
b.6sc.co/v1/beacon/img.gif?token=a87a3edc53b5a86d1795d11887b5aa39&svisitor=null&visitor=067a8780-2e3e-47dd-8522-dbe728ebd677&session=ca548964-1314-40bb-8035-d14c2c63a59d&event=s_update&q=%7B%22settings%22%3A%22%5B%7B%5C%22name%5C%22%3A%5C%22enableCompanyDetails%5C%22%2C%5C%22value%5C%22%3A%5C%22false%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Tue%2C%2007%20May%202024%2008%3A13%3A52%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%22963%5C%22%7D%5D%22%7D&isIframe=false&m=%7B%22description%22%3A%22Join%20us%20for%20a%20threat%20hunting%20adventure%20as%20we%20analyze%20a%20suspicious%20run%20key%20that%20leads%20us%20to%20Cobalt%20Strike%20malware%20hidden%20across%20nearly%20700%20registry%20values.%22%2C%22keywords%22%3A%22%22%2C%22title%22%3A%22Cobalt%20Strikes%20Again%3A%20An%20Analysis%20of%20Obfuscated%20Malware%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&pageViewId=ab2d0d03-41f0-444f-8776-33d4640d035a&webTagId=e666a54d-ff29-48f9-9baa-2be6ac05412e&v=1.1.18
95.101.10.131 43 B
b.6sc.co/v1/beacon/img.gif?token=a87a3edc53b5a86d1795d11887b5aa39&svisitor=null&visitor=067a8780-2e3e-47dd-8522-dbe728ebd677&session=ca548964-1314-40bb-8035-d14c2c63a59d&event=active_time_track&q=%7B%22currentTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A13%3A53%20GMT%22%2C%22lastTrackTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A13%3A52%20GMT%22%2C%22timeSpent%22%3A%221039%22%2C%22totalTimeSpent%22%3A%221039%22%7D&isIframe=false&m=%7B%22description%22%3A%22Join%20us%20for%20a%20threat%20hunting%20adventure%20as%20we%20analyze%20a%20suspicious%20run%20key%20that%20leads%20us%20to%20Cobalt%20Strike%20malware%20hidden%20across%20nearly%20700%20registry%20values.%22%2C%22keywords%22%3A%22%22%2C%22title%22%3A%22Cobalt%20Strikes%20Again%3A%20An%20Analysis%20of%20Obfuscated%20Malware%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&pageViewId=ab2d0d03-41f0-444f-8776-33d4640d035a&webTagId=e666a54d-ff29-48f9-9baa-2be6ac05412e&v=1.1.18
95.101.10.131 43 B
ibc-flow.techtarget.com/a/gif.gif?actTypeId=31&cid=17715818&r=1715069632777&ref=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&version=2.4
34.111.208.231200 OK43 B
b.6sc.co/v1/beacon/img.gif?token=a87a3edc53b5a86d1795d11887b5aa39&svisitor=null&visitor=067a8780-2e3e-47dd-8522-dbe728ebd677&session=ca548964-1314-40bb-8035-d14c2c63a59d&event=s_update&q=%7B%22settings%22%3A%22%5B%7B%5C%22name%5C%22%3A%5C%22enableEventTracking%5C%22%2C%5C%22value%5C%22%3A%5C%22true%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Tue%2C%2007%20May%202024%2008%3A13%3A52%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%22960%5C%22%7D%5D%22%7D&isIframe=false&m=%7B%22description%22%3A%22Join%20us%20for%20a%20threat%20hunting%20adventure%20as%20we%20analyze%20a%20suspicious%20run%20key%20that%20leads%20us%20to%20Cobalt%20Strike%20malware%20hidden%20across%20nearly%20700%20registry%20values.%22%2C%22keywords%22%3A%22%22%2C%22title%22%3A%22Cobalt%20Strikes%20Again%3A%20An%20Analysis%20of%20Obfuscated%20Malware%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&pageViewId=ab2d0d03-41f0-444f-8776-33d4640d035a&webTagId=e666a54d-ff29-48f9-9baa-2be6ac05412e&v=1.1.18
95.101.10.131200 OK43 B
assets-global.website-files.com/6579dd0b5f9a54376d296915/6603101ade570b07f0fb6625_android-chrome-256x256.png
3.164.240.122200 OK24 kB
google.com/pagead/form-data/429191348?gtm=45be4510v9136018371z89171248136za201&gcd=13l3lPl2l1&dma_cps=sypham&dma=1&npa=1&pscdl=noapi&auid=929865009.1715069632&ec_mode=a&em=tv.1
142.250.74.142200 OK0 B
assets-global.website-files.com/6579dd0b5f9a54376d296915/66030a0ceace49bce51c36de_favicon-32x32.png
3.164.240.122 1.3 kB
google.com/ccm/form-data/429191348?gtm=45be4510v9136018371z89171248136za201&gcd=13l3lPl2l1&dma_cps=sypham&dma=1&npa=1&pscdl=noapi&auid=929865009.1715069632&ec_mode=a&em=tv.1
142.250.74.142204 No Content0 B
region1.analytics.google.com/g/collect?v=2&tid=G-GCTMBVFESS&gtm=45je4560h2v9122196611z89171248136za200&_p=1715069631445&_gaz=1&gcd=13l3lPl2l1&npa=1&dma_cps=sypham&dma=1&cid=373740736.1715069633&ul=en-us&sr=1280x1024&pscdl=noapi&_s=1&sid=1715069632&sct=1&seg=0&dl=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&dt=Cobalt%20Strikes%20Again%3A%20An%20Analysis%20of%20Obfuscated%20Malware&en=page_view&_fv=1&_nsi=1&_ss=1&tfd=3507
216.239.32.36204 No Content0 B
bat.bing.com/bat.js
204.79.197.237200 OK13 kB
epsilon.6sense.com/v3/company/details
13.248.142.121200 OK24 B
rc-widget-frame.js.driftt.com/core/assets/js/runtime~main.23dacaf3.js
143.204.55.14 22 kB
www.gstatic.com/recaptcha/releases/V6_85qpc2Xf2sbe3xTnRte7m/recaptcha__en.js
142.250.74.163200 OK206 kB
www.google.no/ads/ga-audiences?v=1&t=sr&slf_rd=1&_r=4&tid=G-GCTMBVFESS&cid=373740736.1715069633&gtm=45je4560h2v9122196611z89171248136za200&aip=1&dma=1&dma_cps=sypham&gcd=13l3lPl2l1&npa=1&z=1746904562
142.250.74.163 42 B
rc-widget-frame.js.driftt.com/core/assets/js/19.6f85b843.chunk.js
143.204.55.14 5.4 kB
cdn.neverbounce.com/widget/dist/NeverBounce.js
54.230.111.89200 OK49 kB
b.6sc.co/v1/beacon/img.gif?token=a87a3edc53b5a86d1795d11887b5aa39&svisitor=null&visitor=067a8780-2e3e-47dd-8522-dbe728ebd677&session=ca548964-1314-40bb-8035-d14c2c63a59d&event=active_time_track&q=%7B%22currentTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A13%3A54%20GMT%22%2C%22lastTrackTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A13%3A53%20GMT%22%2C%22timeSpent%22%3A%221031%22%2C%22totalTimeSpent%22%3A%222070%22%7D&isIframe=false&m=%7B%22description%22%3A%22Join%20us%20for%20a%20threat%20hunting%20adventure%20as%20we%20analyze%20a%20suspicious%20run%20key%20that%20leads%20us%20to%20Cobalt%20Strike%20malware%20hidden%20across%20nearly%20700%20registry%20values.%22%2C%22keywords%22%3A%22%22%2C%22title%22%3A%22Cobalt%20Strikes%20Again%3A%20An%20Analysis%20of%20Obfuscated%20Malware%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&pageViewId=ab2d0d03-41f0-444f-8776-33d4640d035a&an_uid=-1&webTagId=e666a54d-ff29-48f9-9baa-2be6ac05412e&v=1.1.18
95.101.10.131200 OK43 B
rc-widget-frame.js.driftt.com/core/assets/css/28.e29661b2.chunk.css
143.204.55.14200 OK561 B
www.gstatic.com/recaptcha/releases/V6_85qpc2Xf2sbe3xTnRte7m/styles__ltr.css
142.250.74.163200 OK25 kB
rc-widget-frame.js.driftt.com/core/assets/js/49.f7274268.chunk.js
143.204.55.14200 OK247 kB
rc-widget-frame.js.driftt.com/core/assets/css/4.07aa08a5.chunk.css
143.204.55.14200 OK208 kB
fonts.gstatic.com/s/roboto/v18/KFOmCnqEu92Fr1Mu4mxK.woff2
216.58.207.227200 OK15 kB
rc-widget-frame.js.driftt.com/core/assets/js/33.ae4de0a0.chunk.js
143.204.55.14 24 kB
www.gstatic.com/recaptcha/api2/logo_48.png
142.250.74.163200 OK2.2 kB
rc-widget-frame.js.driftt.com/core/assets/js/22.6b9a301a.chunk.js
143.204.55.14200 OK10 kB
bootstrap.api.drift.com/widget_bootstrap/ping/v2
3.94.218.138200 OK208 B
www.gstatic.com/recaptcha/releases/V6_85qpc2Xf2sbe3xTnRte7m/styles__ltr.css
142.250.74.163200 OK25 kB
rc-widget-frame.js.driftt.com/core/assets/css/8.98b34517.chunk.css
143.204.55.14200 OK234 kB
www.google.com/recaptcha/api2/webworker.js?hl=en&v=V6_85qpc2Xf2sbe3xTnRte7m
142.250.74.132200 OK110 B
metrics.api.drift.com/monitoring/metrics/widget/init/v3
3.94.218.138200 OK25 B
b.6sc.co/v1/beacon/img.gif?token=a87a3edc53b5a86d1795d11887b5aa39&svisitor=null&visitor=067a8780-2e3e-47dd-8522-dbe728ebd677&session=ca548964-1314-40bb-8035-d14c2c63a59d&event=active_time_track&q=%7B%22currentTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A13%3A56%20GMT%22%2C%22lastTrackTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A13%3A55%20GMT%22%2C%22timeSpent%22%3A%221002%22%2C%22totalTimeSpent%22%3A%224074%22%7D&isIframe=false&m=%7B%22description%22%3A%22Join%20us%20for%20a%20threat%20hunting%20adventure%20as%20we%20analyze%20a%20suspicious%20run%20key%20that%20leads%20us%20to%20Cobalt%20Strike%20malware%20hidden%20across%20nearly%20700%20registry%20values.%22%2C%22keywords%22%3A%22%22%2C%22title%22%3A%22Cobalt%20Strikes%20Again%3A%20An%20Analysis%20of%20Obfuscated%20Malware%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&pageViewId=ab2d0d03-41f0-444f-8776-33d4640d035a&an_uid=-1&webTagId=e666a54d-ff29-48f9-9baa-2be6ac05412e&v=1.1.18
95.101.10.131200 OK43 B
5092804-4.chat.api.drift.com/ws/websocket?session_token=SFMyNTY.g2gDdAAAAAVkAAJpZG0AAAAVNTA5MjgwNC0yMTgzNDYxNzk3OC00ZAAGb3JnX2lkbQAAAAc1MDkyODA0ZAAJc2NvcGVfc2V0bQAAAARsZWFkZAAHdXNlcl9pZG0AAAALMjE4MzQ2MTc5NzhkAAl1c2VyX3R5cGVkAARsZWFkbgYAAM0dUo8BYgABUYA.c8cmKfodbMUqdtAt1XfF7detoHisMe6lvLtqkEMt_oA&remote_ip=18.232.245.220&vsn=2.0.0
107.22.248.170 0 B
event.api.drift.com/track
3.94.218.138200 OK13 B
event.api.drift.com/track
3.94.218.138200 OK583 B
b.6sc.co/v1/beacon/img.gif?token=a87a3edc53b5a86d1795d11887b5aa39&svisitor=null&visitor=067a8780-2e3e-47dd-8522-dbe728ebd677&session=ca548964-1314-40bb-8035-d14c2c63a59d&event=active_time_track&q=%7B%22currentTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A13%3A57%20GMT%22%2C%22lastTrackTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A13%3A56%20GMT%22%2C%22timeSpent%22%3A%221001%22%2C%22totalTimeSpent%22%3A%225075%22%7D&isIframe=false&m=%7B%22description%22%3A%22Join%20us%20for%20a%20threat%20hunting%20adventure%20as%20we%20analyze%20a%20suspicious%20run%20key%20that%20leads%20us%20to%20Cobalt%20Strike%20malware%20hidden%20across%20nearly%20700%20registry%20values.%22%2C%22keywords%22%3A%22%22%2C%22title%22%3A%22Cobalt%20Strikes%20Again%3A%20An%20Analysis%20of%20Obfuscated%20Malware%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&pageViewId=ab2d0d03-41f0-444f-8776-33d4640d035a&an_uid=-1&webTagId=e666a54d-ff29-48f9-9baa-2be6ac05412e&v=1.1.18
95.101.10.131200 OK43 B
presence.api.drift.com/ws/websocket?session_token=SFMyNTY.g3QAAAACZAAEZGF0YXQAAAAFZAACaWRtAAAAFTUwOTI4MDQtMjE4MzQ2MTc5NzgtNGQABm9yZ19pZG0AAAAHNTA5MjgwNGQACXNjb3BlX3NldG0AAAAEbGVhZGQAB3VzZXJfaWRtAAAACzIxODM0NjE3OTc4ZAAJdXNlcl90eXBlZAAEbGVhZGQABnNpZ25lZG4GAAPNHVKPAQ.kg-kCpkRsACu5QiQ0ILq0oCKO9GFkCFlNEkEUq0O6aA&remote_ip=18.232.245.220&vsn=2.0.0
54.85.240.191 0 B
js.driftt.com/deploy/assets/static/fonts/KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
54.230.111.73200 OK11 kB
js.driftt.com/deploy/assets/static/fonts/KFOlCnqEu92Fr1MmWUlfBBc4AMP6lQ.woff2
54.230.111.73 11 kB
metrics.api.drift.com/monitoring/metrics/event3/bulk
3.94.218.138200 OK25 B
b.6sc.co/v1/beacon/img.gif?token=a87a3edc53b5a86d1795d11887b5aa39&svisitor=null&visitor=067a8780-2e3e-47dd-8522-dbe728ebd677&session=ca548964-1314-40bb-8035-d14c2c63a59d&event=active_time_track&q=%7B%22currentTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A13%3A58%20GMT%22%2C%22lastTrackTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A13%3A57%20GMT%22%2C%22timeSpent%22%3A%221001%22%2C%22totalTimeSpent%22%3A%226076%22%7D&isIframe=false&m=%7B%22description%22%3A%22Join%20us%20for%20a%20threat%20hunting%20adventure%20as%20we%20analyze%20a%20suspicious%20run%20key%20that%20leads%20us%20to%20Cobalt%20Strike%20malware%20hidden%20across%20nearly%20700%20registry%20values.%22%2C%22keywords%22%3A%22%22%2C%22title%22%3A%22Cobalt%20Strikes%20Again%3A%20An%20Analysis%20of%20Obfuscated%20Malware%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&pageViewId=ab2d0d03-41f0-444f-8776-33d4640d035a&an_uid=-1&webTagId=e666a54d-ff29-48f9-9baa-2be6ac05412e&v=1.1.18
95.101.10.131200 OK43 B
b.6sc.co/v1/beacon/img.gif?token=a87a3edc53b5a86d1795d11887b5aa39&svisitor=null&visitor=067a8780-2e3e-47dd-8522-dbe728ebd677&session=ca548964-1314-40bb-8035-d14c2c63a59d&event=active_time_track&q=%7B%22currentTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A13%3A59%20GMT%22%2C%22lastTrackTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A13%3A58%20GMT%22%2C%22timeSpent%22%3A%221004%22%2C%22totalTimeSpent%22%3A%227080%22%7D&isIframe=false&m=%7B%22description%22%3A%22Join%20us%20for%20a%20threat%20hunting%20adventure%20as%20we%20analyze%20a%20suspicious%20run%20key%20that%20leads%20us%20to%20Cobalt%20Strike%20malware%20hidden%20across%20nearly%20700%20registry%20values.%22%2C%22keywords%22%3A%22%22%2C%22title%22%3A%22Cobalt%20Strikes%20Again%3A%20An%20Analysis%20of%20Obfuscated%20Malware%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&pageViewId=ab2d0d03-41f0-444f-8776-33d4640d035a&an_uid=-1&webTagId=e666a54d-ff29-48f9-9baa-2be6ac05412e&v=1.1.18
95.101.10.131200 OK43 B
b.6sc.co/v1/beacon/img.gif?token=a87a3edc53b5a86d1795d11887b5aa39&svisitor=null&visitor=067a8780-2e3e-47dd-8522-dbe728ebd677&session=ca548964-1314-40bb-8035-d14c2c63a59d&event=active_time_track&q=%7B%22currentTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A14%3A00%20GMT%22%2C%22lastTrackTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A13%3A59%20GMT%22%2C%22timeSpent%22%3A%221003%22%2C%22totalTimeSpent%22%3A%228083%22%7D&isIframe=false&m=%7B%22description%22%3A%22Join%20us%20for%20a%20threat%20hunting%20adventure%20as%20we%20analyze%20a%20suspicious%20run%20key%20that%20leads%20us%20to%20Cobalt%20Strike%20malware%20hidden%20across%20nearly%20700%20registry%20values.%22%2C%22keywords%22%3A%22%22%2C%22title%22%3A%22Cobalt%20Strikes%20Again%3A%20An%20Analysis%20of%20Obfuscated%20Malware%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&pageViewId=ab2d0d03-41f0-444f-8776-33d4640d035a&an_uid=-1&webTagId=e666a54d-ff29-48f9-9baa-2be6ac05412e&v=1.1.18
95.101.10.131200 OK43 B
metrics.api.drift.com/monitoring/metrics/add/bulk/v2
3.94.218.138200 OK25 B
b.6sc.co/v1/beacon/img.gif?token=a87a3edc53b5a86d1795d11887b5aa39&svisitor=null&visitor=067a8780-2e3e-47dd-8522-dbe728ebd677&session=ca548964-1314-40bb-8035-d14c2c63a59d&event=active_time_track&q=%7B%22currentTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A14%3A01%20GMT%22%2C%22lastTrackTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A14%3A00%20GMT%22%2C%22timeSpent%22%3A%221003%22%2C%22totalTimeSpent%22%3A%229086%22%7D&isIframe=false&m=%7B%22description%22%3A%22Join%20us%20for%20a%20threat%20hunting%20adventure%20as%20we%20analyze%20a%20suspicious%20run%20key%20that%20leads%20us%20to%20Cobalt%20Strike%20malware%20hidden%20across%20nearly%20700%20registry%20values.%22%2C%22keywords%22%3A%22%22%2C%22title%22%3A%22Cobalt%20Strikes%20Again%3A%20An%20Analysis%20of%20Obfuscated%20Malware%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&pageViewId=ab2d0d03-41f0-444f-8776-33d4640d035a&an_uid=-1&webTagId=e666a54d-ff29-48f9-9baa-2be6ac05412e&v=1.1.18
95.101.10.131200 OK43 B
b.6sc.co/v1/beacon/img.gif?token=a87a3edc53b5a86d1795d11887b5aa39&svisitor=null&visitor=067a8780-2e3e-47dd-8522-dbe728ebd677&session=ca548964-1314-40bb-8035-d14c2c63a59d&event=active_time_track&q=%7B%22currentTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A14%3A02%20GMT%22%2C%22lastTrackTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A14%3A01%20GMT%22%2C%22timeSpent%22%3A%221002%22%2C%22totalTimeSpent%22%3A%2210088%22%7D&isIframe=false&m=%7B%22description%22%3A%22Join%20us%20for%20a%20threat%20hunting%20adventure%20as%20we%20analyze%20a%20suspicious%20run%20key%20that%20leads%20us%20to%20Cobalt%20Strike%20malware%20hidden%20across%20nearly%20700%20registry%20values.%22%2C%22keywords%22%3A%22%22%2C%22title%22%3A%22Cobalt%20Strikes%20Again%3A%20An%20Analysis%20of%20Obfuscated%20Malware%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&pageViewId=ab2d0d03-41f0-444f-8776-33d4640d035a&an_uid=-1&webTagId=e666a54d-ff29-48f9-9baa-2be6ac05412e&v=1.1.18
95.101.10.131 43 B
b.6sc.co/v1/beacon/img.gif?token=a87a3edc53b5a86d1795d11887b5aa39&svisitor=null&visitor=067a8780-2e3e-47dd-8522-dbe728ebd677&session=ca548964-1314-40bb-8035-d14c2c63a59d&event=active_time_track&q=%7B%22currentTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A14%3A05%20GMT%22%2C%22lastTrackTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A14%3A02%20GMT%22%2C%22timeSpent%22%3A%223003%22%2C%22totalTimeSpent%22%3A%2213091%22%7D&isIframe=false&m=%7B%22description%22%3A%22Join%20us%20for%20a%20threat%20hunting%20adventure%20as%20we%20analyze%20a%20suspicious%20run%20key%20that%20leads%20us%20to%20Cobalt%20Strike%20malware%20hidden%20across%20nearly%20700%20registry%20values.%22%2C%22keywords%22%3A%22%22%2C%22title%22%3A%22Cobalt%20Strikes%20Again%3A%20An%20Analysis%20of%20Obfuscated%20Malware%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&pageViewId=ab2d0d03-41f0-444f-8776-33d4640d035a&an_uid=-1&webTagId=e666a54d-ff29-48f9-9baa-2be6ac05412e&v=1.1.18
95.101.10.131 43 B
b.6sc.co/v1/beacon/img.gif?token=a87a3edc53b5a86d1795d11887b5aa39&svisitor=null&visitor=067a8780-2e3e-47dd-8522-dbe728ebd677&session=ca548964-1314-40bb-8035-d14c2c63a59d&event=active_time_track&q=%7B%22currentTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A14%3A08%20GMT%22%2C%22lastTrackTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A14%3A05%20GMT%22%2C%22timeSpent%22%3A%223002%22%2C%22totalTimeSpent%22%3A%2216093%22%7D&isIframe=false&m=%7B%22description%22%3A%22Join%20us%20for%20a%20threat%20hunting%20adventure%20as%20we%20analyze%20a%20suspicious%20run%20key%20that%20leads%20us%20to%20Cobalt%20Strike%20malware%20hidden%20across%20nearly%20700%20registry%20values.%22%2C%22keywords%22%3A%22%22%2C%22title%22%3A%22Cobalt%20Strikes%20Again%3A%20An%20Analysis%20of%20Obfuscated%20Malware%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&pageViewId=ab2d0d03-41f0-444f-8776-33d4640d035a&an_uid=-1&webTagId=e666a54d-ff29-48f9-9baa-2be6ac05412e&v=1.1.18
95.101.10.131 43 B
b.6sc.co/v1/beacon/img.gif?token=a87a3edc53b5a86d1795d11887b5aa39&svisitor=null&visitor=067a8780-2e3e-47dd-8522-dbe728ebd677&session=ca548964-1314-40bb-8035-d14c2c63a59d&event=active_time_track&q=%7B%22currentTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A14%3A11%20GMT%22%2C%22lastTrackTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A14%3A08%20GMT%22%2C%22timeSpent%22%3A%223003%22%2C%22totalTimeSpent%22%3A%2219096%22%7D&isIframe=false&m=%7B%22description%22%3A%22Join%20us%20for%20a%20threat%20hunting%20adventure%20as%20we%20analyze%20a%20suspicious%20run%20key%20that%20leads%20us%20to%20Cobalt%20Strike%20malware%20hidden%20across%20nearly%20700%20registry%20values.%22%2C%22keywords%22%3A%22%22%2C%22title%22%3A%22Cobalt%20Strikes%20Again%3A%20An%20Analysis%20of%20Obfuscated%20Malware%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&pageViewId=ab2d0d03-41f0-444f-8776-33d4640d035a&an_uid=-1&webTagId=e666a54d-ff29-48f9-9baa-2be6ac05412e&v=1.1.18
95.101.10.131 43 B
b.6sc.co/v1/beacon/img.gif?token=a87a3edc53b5a86d1795d11887b5aa39&svisitor=null&visitor=067a8780-2e3e-47dd-8522-dbe728ebd677&session=ca548964-1314-40bb-8035-d14c2c63a59d&event=active_time_track&q=%7B%22currentTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A14%3A14%20GMT%22%2C%22lastTrackTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A14%3A11%20GMT%22%2C%22timeSpent%22%3A%223003%22%2C%22totalTimeSpent%22%3A%2222099%22%7D&isIframe=false&m=%7B%22description%22%3A%22Join%20us%20for%20a%20threat%20hunting%20adventure%20as%20we%20analyze%20a%20suspicious%20run%20key%20that%20leads%20us%20to%20Cobalt%20Strike%20malware%20hidden%20across%20nearly%20700%20registry%20values.%22%2C%22keywords%22%3A%22%22%2C%22title%22%3A%22Cobalt%20Strikes%20Again%3A%20An%20Analysis%20of%20Obfuscated%20Malware%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&pageViewId=ab2d0d03-41f0-444f-8776-33d4640d035a&an_uid=-1&webTagId=e666a54d-ff29-48f9-9baa-2be6ac05412e&v=1.1.18
95.101.10.131 43 B
b.6sc.co/v1/beacon/img.gif?token=a87a3edc53b5a86d1795d11887b5aa39&svisitor=null&visitor=067a8780-2e3e-47dd-8522-dbe728ebd677&session=ca548964-1314-40bb-8035-d14c2c63a59d&event=active_time_track&q=%7B%22currentTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A14%3A17%20GMT%22%2C%22lastTrackTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A14%3A14%20GMT%22%2C%22timeSpent%22%3A%223003%22%2C%22totalTimeSpent%22%3A%2225102%22%7D&isIframe=false&m=%7B%22description%22%3A%22Join%20us%20for%20a%20threat%20hunting%20adventure%20as%20we%20analyze%20a%20suspicious%20run%20key%20that%20leads%20us%20to%20Cobalt%20Strike%20malware%20hidden%20across%20nearly%20700%20registry%20values.%22%2C%22keywords%22%3A%22%22%2C%22title%22%3A%22Cobalt%20Strikes%20Again%3A%20An%20Analysis%20of%20Obfuscated%20Malware%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&pageViewId=ab2d0d03-41f0-444f-8776-33d4640d035a&an_uid=-1&webTagId=e666a54d-ff29-48f9-9baa-2be6ac05412e&v=1.1.18
95.101.10.131 43 B
location.services.mozilla.com/v1/country?key=no-mozilla-api-key
44.240.56.209 48 B
b.6sc.co/v1/beacon/img.gif?token=a87a3edc53b5a86d1795d11887b5aa39&svisitor=null&visitor=067a8780-2e3e-47dd-8522-dbe728ebd677&session=ca548964-1314-40bb-8035-d14c2c63a59d&event=active_time_track&q=%7B%22currentTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A14%3A20%20GMT%22%2C%22lastTrackTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A14%3A17%20GMT%22%2C%22timeSpent%22%3A%223002%22%2C%22totalTimeSpent%22%3A%2228104%22%7D&isIframe=false&m=%7B%22description%22%3A%22Join%20us%20for%20a%20threat%20hunting%20adventure%20as%20we%20analyze%20a%20suspicious%20run%20key%20that%20leads%20us%20to%20Cobalt%20Strike%20malware%20hidden%20across%20nearly%20700%20registry%20values.%22%2C%22keywords%22%3A%22%22%2C%22title%22%3A%22Cobalt%20Strikes%20Again%3A%20An%20Analysis%20of%20Obfuscated%20Malware%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&pageViewId=ab2d0d03-41f0-444f-8776-33d4640d035a&an_uid=-1&webTagId=e666a54d-ff29-48f9-9baa-2be6ac05412e&v=1.1.18
95.101.10.131 43 B
rc-widget-frame.js.driftt.com/core/assets/js/24.24e43c3b.chunk.js
143.204.55.14200 OK51 kB
b.6sc.co/v1/beacon/img.gif?token=a87a3edc53b5a86d1795d11887b5aa39&svisitor=null&visitor=067a8780-2e3e-47dd-8522-dbe728ebd677&session=ca548964-1314-40bb-8035-d14c2c63a59d&event=s_update&q=%7B%22settings%22%3A%22%5B%7B%5C%22name%5C%22%3A%5C%22storeTagId%5C%22%2C%5C%22value%5C%22%3A%5C%22e666a54d-ff29-48f9-9baa-2be6ac05412e%5C%22%2C%5C%22dateTime%5C%22%3A%5C%22Tue%2C%2007%20May%202024%2008%3A13%3A52%20GMT%5C%22%2C%5C%22timeSincePageLoad%5C%22%3A%5C%22959%5C%22%7D%5D%22%7D&isIframe=false&m=%7B%22description%22%3A%22Join%20us%20for%20a%20threat%20hunting%20adventure%20as%20we%20analyze%20a%20suspicious%20run%20key%20that%20leads%20us%20to%20Cobalt%20Strike%20malware%20hidden%20across%20nearly%20700%20registry%20values.%22%2C%22keywords%22%3A%22%22%2C%22title%22%3A%22Cobalt%20Strikes%20Again%3A%20An%20Analysis%20of%20Obfuscated%20Malware%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&pageViewId=ab2d0d03-41f0-444f-8776-33d4640d035a&webTagId=e666a54d-ff29-48f9-9baa-2be6ac05412e&v=1.1.18
95.101.10.131200 OK43 B
rc-widget-frame.js.driftt.com/core/assets/js/14.e24a6190.chunk.js
143.204.55.14200 OK93 kB
rc-widget-frame.js.driftt.com/core/assets/js/3.bbe0e1fa.chunk.js
143.204.55.14200 OK24 kB
b.6sc.co/v1/beacon/img.gif?token=a87a3edc53b5a86d1795d11887b5aa39&svisitor=null&visitor=067a8780-2e3e-47dd-8522-dbe728ebd677&session=ca548964-1314-40bb-8035-d14c2c63a59d&event=active_time_track&q=%7B%22currentTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A13%3A55%20GMT%22%2C%22lastTrackTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A13%3A54%20GMT%22%2C%22timeSpent%22%3A%221002%22%2C%22totalTimeSpent%22%3A%223072%22%7D&isIframe=false&m=%7B%22description%22%3A%22Join%20us%20for%20a%20threat%20hunting%20adventure%20as%20we%20analyze%20a%20suspicious%20run%20key%20that%20leads%20us%20to%20Cobalt%20Strike%20malware%20hidden%20across%20nearly%20700%20registry%20values.%22%2C%22keywords%22%3A%22%22%2C%22title%22%3A%22Cobalt%20Strikes%20Again%3A%20An%20Analysis%20of%20Obfuscated%20Malware%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&pageViewId=ab2d0d03-41f0-444f-8776-33d4640d035a&an_uid=-1&webTagId=e666a54d-ff29-48f9-9baa-2be6ac05412e&v=1.1.18
95.101.10.131200 OK43 B
hubspotonwebflow.com/api/forms/blockList?id=92048dff-ffdc-421f-9344-58c3ff0002d9
76.76.21.61200 OK47 B
www.google.com/recaptcha/api2/anchor?ar=1&k=6LchEywUAAAAAAdAXlscEm7Kcb3DJ38pngRCQJsC&co=aHR0cHM6Ly93d3cuaHVudHJlc3MuY29tOjQ0Mw..&hl=en&v=V6_85qpc2Xf2sbe3xTnRte7m&size=normal&cb=3ed4ifqylzve
142.250.74.132200 OK45 kB
rc-widget-frame.js.driftt.com/core?d=1&embedId=5d3cypit2iz8&eId=5d3cypit2iz8&region=US&forceShow=false&skipCampaigns=false&sessionId=5db9d812-9f99-492f-b86a-7584711e38bf&sessionStarted=1715069632.22&campaignRefreshToken=3ff4782d-aa36-4351-9ce0-0c58401534f6&pageLoadStartTime=1715069629423&mode=CHAT&driftEnableLog=false&loadStrategy=ON_INTERACTIVE&secureIframe=false&u=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware
143.204.55.14200 OK1.5 kB
rc-widget-frame.js.driftt.com/core/assets/js/25.915ff314.chunk.js
143.204.55.14200 OK48 kB
rc-widget-frame.js.driftt.com/core/assets/js/16.890a0911.chunk.js
143.204.55.14200 OK94 kB
rc-widget-frame.js.driftt.com/core/assets/js/17.413337a8.chunk.js
143.204.55.14200 OK41 kB
assets-global.website-files.com/655ddcc107aef728354e9c2a/655ddcc107aef728354e9cbf_Huntress-logo.svg
3.164.240.122200 OK17 kB
rc-widget-frame.js.driftt.com/core/assets/css/35.3cdf48ae.chunk.css
143.204.55.14200 OK16 kB
rc-widget-frame.js.driftt.com/core/assets/js/9.4a3e9801.chunk.js
143.204.55.14200 OK36 kB
rc-widget-frame.js.driftt.com/core/assets/js/20.8c21ea18.chunk.js
143.204.55.14200 OK76 kB
rc-widget-frame.js.driftt.com/core/assets/js/18.9c1bd1fb.chunk.js
143.204.55.14200 OK64 kB
assets.website-files.com/6579dd0b5f9a54376d296915/6579dd0b5f9a54376d296927_hknova-semibold-webfont.woff2
143.204.55.45200 OK18 kB
assets.website-files.com/6579dd0b5f9a54376d296915/6579dd0b5f9a54376d296a6e_DMSans_24pt-Bold.ttf
143.204.55.45200 OK56 kB
rc-widget-frame.js.driftt.com/core/assets/js/8.5fdda827.chunk.js
143.204.55.14200 OK83 kB
tracking.g2crowd.com/attribution_tracking/conversions/1006267.js?p=https://www.huntress.com/blog/cobalt-strike-analysis-of-obfuscated-malware&e=
104.18.43.31200 OK958 B
rc-widget-frame.js.driftt.com/core/assets/js/27.3951aad8.chunk.js
143.204.55.14200 OK68 kB
rc-widget-frame.js.driftt.com/core/assets/js/21.b8c41db9.chunk.js
143.204.55.14200 OK17 kB
rc-widget-frame.js.driftt.com/core/assets/js/40.31ef8dbf.chunk.js
143.204.55.14200 OK12 kB
rc-widget-frame.js.driftt.com/core/assets/css/26.5208cc6b.chunk.css
143.204.55.14200 OK11 kB
api.neverbounce.com/v4/poe/notify?key=public_0e95e4405380cdd75d8aa57fca3692dc&event=form.load&callback=__neverbounce_133060
44.218.103.148200 OK62 B
rc-widget-frame.js.driftt.com/core/assets/js/26.69219246.chunk.js
143.204.55.14200 OK16 kB
5092804-4.chat.api.drift.com/ws/websocket?session_token=SFMyNTY.g2gDdAAAAAVkAAJpZG0AAAAVNTA5MjgwNC0yMTgzNDYxNzk3OC00ZAAGb3JnX2lkbQAAAAc1MDkyODA0ZAAJc2NvcGVfc2V0bQAAAARsZWFkZAAHdXNlcl9pZG0AAAALMjE4MzQ2MTc5NzhkAAl1c2VyX3R5cGVkAARsZWFkbgYAAM0dUo8BYgABUYA.c8cmKfodbMUqdtAt1XfF7detoHisMe6lvLtqkEMt_oA&remote_ip=18.232.245.220&vsn=2.0.0
107.22.248.170101 Switching Protocols0 B
trk.techtarget.com/tracking.js
104.18.36.196200 OK2.9 kB
rc-widget-frame.js.driftt.com/core/assets/js/57.28dde8ce.chunk.js
143.204.55.14200 OK19 kB
assets-global.website-files.com/6579dd0b5f9a54376d296915/6579dd0b5f9a54376d296a7c_search.svg
3.164.240.122200 OK654 B
b.6sc.co/v1/beacon/img.gif?token=a87a3edc53b5a86d1795d11887b5aa39&svisitor=null&visitor=067a8780-2e3e-47dd-8522-dbe728ebd677&session=ca548964-1314-40bb-8035-d14c2c63a59d&event=a_pageload&q=%7B%22pageLoadTime%22%3A%22Tue%2C%2007%20May%202024%2008%3A13%3A52%20GMT%22%7D&isIframe=false&m=%7B%22description%22%3A%22Join%20us%20for%20a%20threat%20hunting%20adventure%20as%20we%20analyze%20a%20suspicious%20run%20key%20that%20leads%20us%20to%20Cobalt%20Strike%20malware%20hidden%20across%20nearly%20700%20registry%20values.%22%2C%22keywords%22%3A%22%22%2C%22title%22%3A%22Cobalt%20Strikes%20Again%3A%20An%20Analysis%20of%20Obfuscated%20Malware%22%7D&cb=&r=&thirdParty=%7B%7D&v2=1&pageURL=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&pageViewId=ab2d0d03-41f0-444f-8776-33d4640d035a&webTagId=8769192b-20ba-4df2-8d62-2740a805c3e8&v=1.1.18
95.101.10.131200 OK43 B
js.zi-scripts.com/unified/v1/master/getSubscriptions
172.64.150.44204 No Content0 B
forms.hscollectedforms.net/collected-forms/v1/config/json?portalId=3911692&utk=
104.16.109.254200 OK115 B
rc-widget-frame.js.driftt.com/core/assets/js/28.7257241a.chunk.js
143.204.55.14200 OK50 kB
www.google.com/js/bg/tKcPQSh2okjZHiZ2jIssRExVWo45mlVHOakavsOpwK4.js
142.250.74.132200 OK18 kB
a.quora.com/qevents.js
0.0.0.0 0 B
rc-widget-frame.js.driftt.com/core/assets/js/1.9d9c8c3b.chunk.js
143.204.55.14200 OK55 kB
js.hsadspixel.net/fb.js
104.17.223.152200 OK6.3 kB
www.google.com/recaptcha/api.js
142.250.74.132200 OK850 B
hubspotonwebflow.com/assets/js/blockedDomains.json
76.76.21.61200 OK100 kB
rc-widget-frame.js.driftt.com/core/assets/js/11.639238ba.chunk.js
143.204.55.14200 OK24 kB
rc-widget-frame.js.driftt.com/core/assets/js/0.0b2ebd4a.chunk.js
143.204.55.14200 OK8.8 kB
hubspotonwebflow.com/api/forms/blockList?id=c32ae9e7-4a4b-4436-a6e4-0de41bd8df62
76.76.21.61200 OK47 B
bat.bing.com/p/action/187059084.js
204.79.197.237200 OK3.7 kB
presence.api.drift.com/ws/websocket?session_token=SFMyNTY.g3QAAAACZAAEZGF0YXQAAAAFZAACaWRtAAAAFTUwOTI4MDQtMjE4MzQ2MTc5NzgtNGQABm9yZ19pZG0AAAAHNTA5MjgwNGQACXNjb3BlX3NldG0AAAAEbGVhZGQAB3VzZXJfaWRtAAAACzIxODM0NjE3OTc4ZAAJdXNlcl90eXBlZAAEbGVhZGQABnNpZ25lZG4GAAPNHVKPAQ.kg-kCpkRsACu5QiQ0ILq0oCKO9GFkCFlNEkEUq0O6aA&remote_ip=18.232.245.220&vsn=2.0.0
54.85.240.191101 Switching Protocols0 B
rc-widget-frame.js.driftt.com/core/assets/js/41.b4fc4de2.chunk.js
143.204.55.14200 OK26 kB
js.hs-banner.com/3911692.js
104.18.34.229200 OK63 kB
api.neverbounce.com/v4/poe/notify?key=public_0e95e4405380cdd75d8aa57fca3692dc&event=form.load&callback=__neverbounce_88949
44.218.103.148200 OK62 B
rc-widget-frame.js.driftt.com/core/assets/css/16.22abfce0.chunk.css
143.204.55.14200 OK24 B
js.zi-scripts.com/unified/v1/master/getSubscriptions
172.64.150.44200 OK146 B
rc-widget-frame.js.driftt.com/core/assets/js/main~493df0b3.91dc5a14.chunk.js
143.204.55.14200 OK7.2 kB
js.zi-scripts.com/zi-tag.js
172.64.150.44200 OK9.5 kB
www.google.com/recaptcha/api2/bframe?hl=en&v=V6_85qpc2Xf2sbe3xTnRte7m&k=6LchEywUAAAAAAdAXlscEm7Kcb3DJ38pngRCQJsC
142.250.74.132200 OK7.4 kB
rc-widget-frame.js.driftt.com/core/assets/css/25.7addeee7.chunk.css
143.204.55.14200 OK9.0 kB
bat.bing.com/action/0?ti=187059084&tm=gtm002&Ver=2&mid=5bd62046-e995-4aa4-8d5d-e337e6d5f6cc&sid=be7c53b00c4911ef9f882d4b3bb4ba09&vid=be7c61500c4911ef8177d1755aaa8281&vids=1&msclkid=N&pi=918639831&lg=en-US&sw=1280&sh=1024&sc=24&tl=Cobalt%20Strikes%20Again%3A%20An%20Analysis%20of%20Obfuscated%20Malware&p=https%3A%2F%2Fwww.huntress.com%2Fblog%2Fcobalt-strike-analysis-of-obfuscated-malware&r=&lt=2807&pt=1715069629217,,,,,50,52,52,52,128,89,128,194,206,512,2720,2797,2807,,,&pn=0,0&evt=pageLoad&sv=1&rn=690706
204.79.197.237204 No Content0 B
rc-widget-frame.js.driftt.com/core/assets/js/34.4924e4bf.chunk.js
143.204.55.14200 OK27 kB
rc-widget-frame.js.driftt.com/core/assets/js/35.3969a3d7.chunk.js
143.204.55.14200 OK12 kB
bootstrap.api.drift.com/widget_bootstrap
3.94.218.138200 OK11 kB