在线病毒检测器 | v.1.0.151.174 |
数据库版本: | 2023-12-08 08:01:00 |
Cobalt Strike是一种付费的渗透测试工具,被安全专业人士用来在目标系统上部署一个名为“Beacon”的代理。Beacon为操作员提供各种功能,包括命令执行、键盘记录、文件传输、SOCKS代理、权限提升、mimikatz、端口扫描和横向移动。Beacon在内存中运行,是无文件的,在利用漏洞或执行shellcode加载器后加载到进程的内存中,避免了磁盘存储。它支持多种协议的通信和分阶段,包括HTTP、HTTPS、DNS、SMB命名管道以及正向和反向TCP连接,具有串联的能力。此外,Cobalt Strike还包括Artifact Kit,用于创建shellcode加载器的工具包。
File | 8618ac68a6f030225cd12dbd1b7bd55a1df84f96950bdaacc2e3f37715ade1ee |
已检查 | 2023-12-08 06:19:27 |
MD5 | 0a3fc1a357b4972a2d3a9031ad623b96 |
SHA1 | 1ca9a642e6524164466244179fb6bb909d1b79cb |
SHA256 | 8618ac68a6f030225cd12dbd1b7bd55a1df84f96950bdaacc2e3f37715ade1ee |
SHA512 | 0b222e612cbd776738b3252c9c23b7147ea5efc4eb898fc608e3bd7390b495f48d21b5e342f1e68fca92427b9b041739a10817e107d23cd142ae7b637c4e64f5 |
Imphash | 021c089fee2857f6524093c58ba8e652 |
File Size | 1421824 bytes |
Gridinsoft能够识别并消除Trojan.Win64.CobaltStrike.tr,无需进一步的用户干预。
Image Base: | 0x140000000 |
Entry Point: | 0x14015e47d |
Compilation: | 2023-12-08 03:23:48 |
Checksum: | 0x001697a7 (Actual: 0x001697a7) |
OS Version: | 6.0 |
PDB Path: | C:\Users\Administrator\Downloads\EDR-Bypass-demo-main\chapter4-demo4\x64\Release\ShellcodeFluctuation.pdb |
PEiD: | PE32+ executable (console) x86-64, for MS Windows |
Sign: | The PE file does not contain a certificate table. |
Sections: | 5 |
Imports: | KERNEL32, MSVCP140, VCRUNTIME140_1, VCRUNTIME140, api-ms-win-crt-runtime-l1-1-0, api-ms-win-crt-heap-l1-1-0, api-ms-win-crt-math-l1-1-0, api-ms-win-crt-stdio-l1-1-0, api-ms-win-crt-locale-l1-1-0, IPHLPAPI, msvcrt, PSAPI, USER32, ADVAPI32, SHELL32, |
Exports: | 0 |
Resources: | 1 |
名称 | 虚拟地址 | 虚拟大小 | 原始大小 | MD5 | 熵 |
---|---|---|---|---|---|
.text | 0x00001000 | 0x0000e000 | 0x00005800 | 72687ad07885af813f2b8dc5bb0428f8 | 7.97 |
.sedata | 0x0000f000 | 0x00154000 | 0x00153e00 | 231c204bb54c5afe021ca0fed2af0482 | 7.63 |
.idata | 0x00163000 | 0x00001000 | 0x00000600 | 56439fdaba6637de8158672eb4fbfa73 | 3.94 |
.rsrc | 0x00164000 | 0x00001000 | 0x00000200 | fa4045cf2a7bb774762f58444a604378 | 4.72 |
.sedata | 0x00165000 | 0x00001000 | 0x00001000 | 31a8b5369f62771cc77f3d18339b3272 | 7.98 |