Alias Description | Association Type | Votes |
---|---|---|
The Batloader Malware is associated with Cobalt Strike Beacon. Batloader is a malware downloader posing as installers or updates for legitimate applications such as Microsoft Teams, Zoom, and others. This malicious software can infiltrate systems through suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside, it can steal personal | Unspecified | 4 |
The python310.dll Malware is associated with Cobalt Strike Beacon. Python310.dll is a malicious software (malware) that infiltrates systems by installing a trojanized version of itself and establishing persistence through a run key named "Python". This is achieved by manipulating the value to be "C:\Users\Public\Music\python\pythonw.exe". The malware can enter your | Unspecified | 2 |
The Truebot Malware is associated with Cobalt Strike Beacon. Truebot is a malicious software (malware) utilized by the CL0P actors, designed to exploit and damage computer systems. This malware can infiltrate systems through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, Truebot serves multiple purposes: it can dow | Unspecified | 2 |
The Conti Malware is associated with Cobalt Strike Beacon. Conti is a type of malware, specifically ransomware, which is designed to infiltrate and damage computer systems. This malicious software can enter systems through various methods such as suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can steal persona | Unspecified | 2 |
The pythonw.exe Malware is associated with Cobalt Strike Beacon. Pythonw.exe, a malware that exploits and damages your computer or device, has been identified to execute malicious code on Windows systems. This harmful program infiltrates your system through suspicious downloads, emails, or websites without your knowledge, with the potential to steal personal info | Unspecified | 2 |
The Meterpreter Malware is associated with Cobalt Strike Beacon. Meterpreter is a type of malware that acts as an attack payload within the Metasploit framework, providing threat actors with an interactive shell to control and execute code on a compromised system. The malware is often deployed covertly through suspicious downloads, emails, or websites. Once insta | Unspecified | 2 |
The Carbanak Malware is associated with Cobalt Strike Beacon. Carbanak is a notorious malware developed by the cybercrime collective known as FIN7, also referred to as Carbon Spider, Cobalt Group, and Navigator Group. The group, which has been active since 2012, is of Russian origin and has been particularly focused on exploiting the restaurant, gambling, and | Unspecified | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The Lace Tempest Threat Actor is associated with Cobalt Strike Beacon. Lace Tempest, a threat actor known for executing actions with malicious intent, has been identified as the orchestrator behind a series of cyber attacks exploiting a zero-day vulnerability in SysAid. The exploit was first brought to light by SysAid and further detailed in a blog post on TuxCare. Thi | Unspecified | 3 |
The FIN7 Threat Actor is associated with Cobalt Strike Beacon. FIN7, also known as Carbanak, Carbon Spider, Cobalt Group, and Navigator Group, is a notorious cybercrime group that has been active since 2012. The group is recognized for its advanced combination of malware and social engineering tactics, having executed numerous successful attacks against global | Unspecified | 2 |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
Recorded Future | a month ago | ||
Trend Micro | a month ago | ||
Unit42 | 2 months ago | ||
CISA | 2 months ago | ||
DARKReading | 5 months ago | ||
CERT-EU | a year ago | ||
MITRE | 2 years ago | ||
Unit42 | 6 months ago | ||
DARKReading | 7 months ago | ||
InfoSecurity-magazine | 7 months ago | ||
Fortinet | 7 months ago | ||
Checkpoint | 7 months ago | ||
Checkpoint | 7 months ago | ||
DARKReading | 7 months ago | ||
Trend Micro | 2 years ago | ||
Securityaffairs | 8 months ago | ||
DARKReading | 8 months ago | ||
SANS ISC | 9 months ago | ||
SANS ISC | 9 months ago | ||
Trend Micro | 10 months ago |