Alias Description | Votes |
---|---|
Cobalt Strike is a possible alias for pythonw.exe. Cobalt Strike is a powerful malware tool that has been used extensively by cybercriminals and threat actors worldwide. It operates through a built-in reflective loader that leverages the kernel32.LoadLibraryA API for DLL loading, which allows the beacon DLL to be loaded into virtual memory. This pro | 2 |
Alias Description | Association Type | Votes |
---|---|---|
The python310.dll Malware is associated with pythonw.exe. Python310.dll is a malicious software (malware) that infiltrates systems by installing a trojanized version of itself and establishing persistence through a run key named "Python". This is achieved by manipulating the value to be "C:\Users\Public\Music\python\pythonw.exe". The malware can enter your | Unspecified | 2 |
The Cobalt Strike Beacon Malware is associated with pythonw.exe. Cobalt Strike Beacon is a type of malware, a harmful software designed to exploit and damage computer systems. It is often loaded by HUI Loader through various files such as mpc.tmp, dlp.ini, vmtools.ini, and an encrypted file vm.cfg. The Insikt Group has identified six distinct Cobalt Strike Beacon | Unspecified | 2 |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
Flashpoint | a year ago | ||
InfoSecurity-magazine | a year ago | ||
CERT-EU | 2 years ago | ||
CERT-EU | 2 years ago | ||
CERT-EU | 2 years ago | ||
Trend Micro | 2 years ago |