Report Overview
Visitedpublic
2024-01-09 21:03:19
Tags
Submit Tags
URL
d1j1tfq58ortei.cloudfront.net/26-https-regasm.zip
Finishing URL
about:privatebrowsing
IP / ASN
54.230.241.58
#16509 AMAZON-02
Title
about:privatebrowsing

Malware - Cobalt Strike

Detections

urlquery
2
Network Intrusion Detection
0
Threat Detection Systems
62

Host Summary

HostRankRegisteredFirst SeenLast Seen
d1j1tfq58ortei.cloudfront.net
unknown2008-04-252024-01-09 20:24:382024-01-09 20:24:38
aus5.mozilla.org
25481998-01-242015-10-27 08:06:242024-01-09 05:09:25
ciscobinary.openh264.org
408222013-10-192014-10-07 07:43:562024-01-09 05:09:25

Related reports

Network Intrusion Detection Systems

Suricata /w Emerging Threats Pro

No alerts detected

Threat Detection Systems

Public InfoSec YARA rules
SeverityIndicatorAlert
mediumd1j1tfq58ortei.cloudfront.net/26-https-regasm.zipIdentifies strings used in Cobalt Strike Beacon DLL
mediumd1j1tfq58ortei.cloudfront.net/26-https-regasm.zipThe CobaltStrike malware family.
mediumd1j1tfq58ortei.cloudfront.net/26-https-regasm.zipDetects CobaltStrike C2 encoded profile configuration
mediumd1j1tfq58ortei.cloudfront.net/26-https-regasm.zipDetects CobaltStrike MZ header ReflectiveLoader launcher
mediumd1j1tfq58ortei.cloudfront.net/26-https-regasm.zipDetects static bytes in Cobalt Strike 4.5 sleep mask function that are not obfuscated
mediumd1j1tfq58ortei.cloudfront.net/26-https-regasm.zipDetects CobaltStrike payloads
mediumd1j1tfq58ortei.cloudfront.net/26-https-regasm.zipTrojan_Raw_Generic_4
mediumd1j1tfq58ortei.cloudfront.net/26-https-regasm.zipCobalt Strike's sleeve/BeaconLoader.x64.o (Base) Versions 4.3 through at least 4.6
mediumd1j1tfq58ortei.cloudfront.net/26-https-regasm.zipDetects Meterpreter in-memory
mediumd1j1tfq58ortei.cloudfront.net/26-https-regasm.zipDetects suspicious single byte XORed keyword 'Mozilla/5.0' - it uses yara's XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key.
mediumd1j1tfq58ortei.cloudfront.net/26-https-regasm.zipRule to detect CobaltStrike beacon
mediumd1j1tfq58ortei.cloudfront.net/26-https-regasm.zipmeth_stackstrings
mediumd1j1tfq58ortei.cloudfront.net/26-https-regasm.zipCobalt Strike Beacon Payload
mediumd1j1tfq58ortei.cloudfront.net/26-https-regasm.zipWindows.Trojan.CobaltStrike
mediumd1j1tfq58ortei.cloudfront.net/26-https-regasm.zipWindows.Trojan.CobaltStrike
mediumd1j1tfq58ortei.cloudfront.net/26-https-regasm.zipWindows.Trojan.CobaltStrike
mediumd1j1tfq58ortei.cloudfront.net/26-https-regasm.zipWindows.Trojan.CobaltStrike
mediumd1j1tfq58ortei.cloudfront.net/26-https-regasm.zipWindows.Trojan.CobaltStrike
mediumd1j1tfq58ortei.cloudfront.net/26-https-regasm.zipCobalt Strike's sleeve/BeaconLoader.x64.o (Base) Versions 4.3 through at least 4.6
mediumd1j1tfq58ortei.cloudfront.net/26-https-regasm.zipDetects win.cobalt_strike.

OpenPhish

No alerts detected


PhishTank

No alerts detected


mnemonic secure dns

No alerts detected


Quad9 DNS

No alerts detected


ThreatFox

No alerts detected


File detected

URL
d1j1tfq58ortei.cloudfront.net/26-https-regasm.zip
IP / ASN
54.230.241.133
#16509 AMAZON-02
File Overview
File TypeZip archive data, at least v2.0 to extract, compression method=store
Size314 kB (314036 bytes)
MD54f045ec9b258abb011d1a591a08f4fda
SHA1ddb952149339d518c2b4204793bc5d1dd193b525
Archive (2)
FilenameMD5File type
regasm-payload_x64.dllbb70a52d15107c0683ad8bef64bdc9a0PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows, 2 sections
regasm-payload_x64.lnkc9e5e0201509ec897af4aa8874a65da1MS Windows shortcut, Item id list present, Points to a file or directory, Has command line arguments, Icon number=278, Archive, ctime=Sat Dec 7 09:10:34 2019, mtime=Wed Dec 16 18:27:32 2020, atime=Sat Dec 7 09:10:34 2019, length=65168, window=hidenormalshowminimized

Detections

AnalyzerVerdictAlert
Public Nextron YARA rulesmalware
Identifies strings used in Cobalt Strike Beacon DLL
Public Nextron YARA rulesmalware
The CobaltStrike malware family.
Public Nextron YARA rulesmalware
Detects CobaltStrike C2 encoded profile configuration
Public Nextron YARA rulesmalware
Detects CobaltStrike MZ header ReflectiveLoader launcher
Public Nextron YARA rulesmalware
Detects static bytes in Cobalt Strike 4.5 sleep mask function that are not obfuscated
Public Nextron YARA rulesmalware
Detects CobaltStrike payloads
Public Nextron YARA rulesmalware
Cobalt Strike's sleeve/BeaconLoader.x64.o (Base) Versions 4.3 through at least 4.6
Public Nextron YARA rulesmalware
Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended
Public Nextron YARA rulesmalware
Detects Meterpreter in-memory
Public Nextron YARA rulesmalware
Detects an XORed URL in an executable
Public Nextron YARA rulesmalware
Detects suspicious single byte XORed keyword 'Mozilla/5.0' - it uses yara's XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key.
Trellix Threat Reasearch YARA rulesmalware
Rule to detect CobaltStrike beacon
YARAhub by abuse.chmalware
meth_stackstrings
CAPEv2 YARA detection rulesmalware
Cobalt Strike Beacon Payload
Elastic Security YARA Rulesmalware
Windows.Trojan.CobaltStrike
Elastic Security YARA Rulesmalware
Windows.Trojan.CobaltStrike
Elastic Security YARA Rulesmalware
Windows.Trojan.CobaltStrike
Elastic Security YARA Rulesmalware
Windows.Trojan.CobaltStrike
Elastic Security YARA Rulesmalware
Windows.Trojan.CobaltStrike
Google GCTI YARA rulesmalware
Cobalt Strike's sleeve/BeaconLoader.x64.o (Base) Versions 4.3 through at least 4.6
Malpedia's yara-signator rulesmalware
Detects win.cobalt_strike.
Public InfoSec YARA rulesmalware
Identifies executable artefacts in shortcut (LNK) files.
Public Nextron YARA rulesmalware
Identifies strings used in Cobalt Strike Beacon DLL
Public Nextron YARA rulesmalware
The CobaltStrike malware family.
Public Nextron YARA rulesmalware
Detects CobaltStrike C2 encoded profile configuration
Public Nextron YARA rulesmalware
Detects CobaltStrike MZ header ReflectiveLoader launcher
Public Nextron YARA rulesmalware
Detects static bytes in Cobalt Strike 4.5 sleep mask function that are not obfuscated
Public Nextron YARA rulesmalware
Detects CobaltStrike payloads
Public Nextron YARA rulesmalware
Trojan_Raw_Generic_4
Public Nextron YARA rulesmalware
Cobalt Strike's sleeve/BeaconLoader.x64.o (Base) Versions 4.3 through at least 4.6
Public Nextron YARA rulesmalware
Detects Meterpreter in-memory
Public Nextron YARA rulesmalware
Detects suspicious single byte XORed keyword 'Mozilla/5.0' - it uses yara's XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key.
Trellix Threat Reasearch YARA rulesmalware
Rule to detect CobaltStrike beacon
YARAhub by abuse.chmalware
meth_stackstrings
CAPEv2 YARA detection rulesmalware
Cobalt Strike Beacon Payload
Elastic Security YARA Rulesmalware
Windows.Trojan.CobaltStrike
Elastic Security YARA Rulesmalware
Windows.Trojan.CobaltStrike
Elastic Security YARA Rulesmalware
Windows.Trojan.CobaltStrike
Elastic Security YARA Rulesmalware
Windows.Trojan.CobaltStrike
Elastic Security YARA Rulesmalware
Windows.Trojan.CobaltStrike
Google GCTI YARA rulesmalware
Cobalt Strike's sleeve/BeaconLoader.x64.o (Base) Versions 4.3 through at least 4.6
Malpedia's yara-signator rulesmalware
Detects win.cobalt_strike.
URL
ciscobinary.openh264.org/openh264-linux64-2e1774ab6dc6c43debb0b5b628bdf122a391d521.zip
IP / ASN
2.22.61.59
#20940 Akamai International B.V.
File Overview
File TypeZip archive data, at least v2.0 to extract, compression method=deflate
Size512 kB (511815 bytes)
MD5152eda253e242e18443ef3282495bc7c
SHA1ff0fa85565f21ec4931baad4573b4c0bd08c4019
Archive (2)
FilenameMD5File type
gmpopenh264.info3d33cdc0b3d281e67dd52e14435dd04fASCII text
libgmpopenh264.sob2c1253e8a09cfe03b3d7f37de12dff7ELF 64-bit LSB shared object, x86-64, version 1 (SYSV)

JavaScript (0)

HTTP Transactions (3)

URLIPResponseSize
GET d1j1tfq58ortei.cloudfront.net/26-https-regasm.zip
54.230.241.133200 OK314 kB
aus5.mozilla.org/update/3/GMP/111.0a1/20230218104546/Linux_x86_64-gcc3/null/default/Linux%205.15.0-76-generic%20(GTK%203.24.34%2Clibpulse%20not-available)/default/default/update.xml
35.244.181.201 444 B
ciscobinary.openh264.org/openh264-linux64-2e1774ab6dc6c43debb0b5b628bdf122a391d521.zip
2.22.61.59 512 kB