Alias Description | Association Type | Votes |
---|---|---|
The Batloader Malware is associated with Cobalt Strike Beacon. Batloader is a malware downloader posing as installers or updates for legitimate applications such as Microsoft Teams, Zoom, and others. This malicious software can infiltrate systems through suspicious downloads, emails, or websites, often unbeknownst to the user. Once inside, it can steal personal | Unspecified | 4 |
The python310.dll Malware is associated with Cobalt Strike Beacon. Python310.dll is a malicious software (malware) that infiltrates systems by installing a trojanized version of itself and establishing persistence through a run key named "Python". This is achieved by manipulating the value to be "C:\Users\Public\Music\python\pythonw.exe". The malware can enter your | Unspecified | 2 |
The Truebot Malware is associated with Cobalt Strike Beacon. Truebot is a malicious software (malware) utilized by the CL0P actors, designed to exploit and damage computer systems. This malware can infiltrate systems through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, Truebot serves multiple purposes: it can dow | Unspecified | 2 |
The Conti Malware is associated with Cobalt Strike Beacon. Conti is a notorious type of malware, specifically ransomware, that infiltrates computer systems to steal data and disrupt operations. The malicious software often spreads through suspicious downloads, emails, or websites, and once inside, it can hold data hostage for ransom. The Conti ransomware op | Unspecified | 2 |
The pythonw.exe Malware is associated with Cobalt Strike Beacon. Pythonw.exe, a malware that exploits and damages your computer or device, has been identified to execute malicious code on Windows systems. This harmful program infiltrates your system through suspicious downloads, emails, or websites without your knowledge, with the potential to steal personal info | Unspecified | 2 |
The Meterpreter Malware is associated with Cobalt Strike Beacon. Meterpreter is a type of malware that is part of the Metasploit penetration testing software. It serves as an attack payload and provides an interactive shell, allowing threat actors to control and execute code on a compromised system. Advanced Persistent Threat (APT) actors have created and used a | Unspecified | 2 |
The Carbanak Malware is associated with Cobalt Strike Beacon. Carbanak is a notorious malware developed by the cybercrime collective known as FIN7, also referred to as Carbon Spider, Cobalt Group, and Navigator Group. The group, which has been active since 2012, is of Russian origin and has been particularly focused on exploiting the restaurant, gambling, and | Unspecified | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The Lace Tempest Threat Actor is associated with Cobalt Strike Beacon. Lace Tempest, a threat actor known for executing actions with malicious intent, has been identified as the orchestrator behind a series of cyber attacks exploiting a zero-day vulnerability in SysAid. The exploit was first brought to light by SysAid and further detailed in a blog post on TuxCare. Thi | Unspecified | 3 |
The FIN7 Threat Actor is associated with Cobalt Strike Beacon. FIN7, also known as Carbanak, Carbon Spider, Cobalt Group, and Navigator Group, is a notorious cybercrime group that has been active since 2012. The group is recognized for its advanced combination of malware and social engineering tactics, having executed numerous successful attacks against global | Unspecified | 2 |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
DARKReading | 2 months ago | ||
CERT-EU | 9 months ago | ||
MITRE | 2 years ago | ||
Unit42 | 4 months ago | ||
DARKReading | 4 months ago | ||
InfoSecurity-magazine | 4 months ago | ||
Fortinet | 4 months ago | ||
Checkpoint | 5 months ago | ||
Checkpoint | 5 months ago | ||
DARKReading | 5 months ago | ||
Trend Micro | a year ago | ||
Securityaffairs | 6 months ago | ||
DARKReading | 6 months ago | ||
SANS ISC | 7 months ago | ||
SANS ISC | 7 months ago | ||
Trend Micro | 8 months ago | ||
CERT-EU | 8 months ago | ||
CrowdStrike | 8 months ago | ||
CERT-EU | 9 months ago | ||
CERT-EU | 9 months ago |