Malware

Behavior:Win32/CobaltStrike.B removal guide

Malware Removal

The Behavior:Win32/CobaltStrike.B is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Behavior:Win32/CobaltStrike.B virus can do?

  • Executable code extraction
  • Injection (inter-process)
  • Injection (Process Hollowing)
  • Creates RWX memory
  • A process attempted to delay the analysis task.
  • Attempts to connect to a dead IP:Port (5 unique times)
  • Drops a binary and executes it
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • The binary likely contains encrypted or compressed data.
  • Executed a process and injected code into it, probably while unpacking
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Steals private information from local Internet browsers
  • Attempts to modify proxy settings
  • Attempts to access Bitcoin/ALTCoin wallets
  • Collects information to fingerprint the system

Related domains:

z.whorecord.xyz
a.tomx.xyz
duranforme.ug
telete.in
apps.identrust.com

How to determine Behavior:Win32/CobaltStrike.B?


File Info:

crc32: 6A14231E
md5: 145dc1bfd96fb13644e764d0032e6c4e
name: rac2.exe
sha1: 15652c5110b51eeab7d023d75a4337de84ef7528
sha256: 82d32f5841ba04262e4b1a15d798cfbd69a4bc9ebd37caf3573818e7a2140639
sha512: a7bd3ffc57c05dab54672f344708478fd4af2635cdedacc8779b55e01ffb6f21cfdcaf7b676269c3ca53f28267c83f48db6e943291f176dcd89e4cc97b4456c6
ssdeep: 24576:YmAHk6UJ6rxYB79mbL0RHdGr4UNZiaepiVnAeybxDgue0KurYvGfq6Cf9wuflCf:YmAHk6UJ6rxYB79mbL0RHdGr4UNZiae
type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows

Version Info:

Translation: 0x0000 0x04b0
LegalCopyright: Copyright xa9 2016 - 2020
Assembly Version: 1.4.0.0
InternalName: GoXoupPkjFiqvbpgc.exe
FileVersion: 1.4.0.0
CompanyName:
LegalTrademarks:
Comments:
ProductName: Celestial Core
ProductVersion: 1.4.0.0
FileDescription: Celestial Core
OriginalFilename: GoXoupPkjFiqvbpgc.exe

Behavior:Win32/CobaltStrike.B also known as:

MicroWorld-eScanGen:Variant.Razy.679224
CAT-QuickHealTrojan.Ludicrouz
Qihoo-360Generic/Trojan.PSW.374
McAfeeFareit-FUF!145DC1BFD96F
CylanceUnsafe
SangforMalware
K7AntiVirusTrojan ( 00567fc31 )
AlibabaTrojanPSW:MSIL/Nanocore.344356c6
K7GWTrojan ( 00567fc31 )
SymantecML.Attribute.HighConfidence
APEXMalicious
KasperskyHEUR:Trojan-PSW.MSIL.Agensla.gen
BitDefenderGen:Variant.Razy.679224
Paloaltogeneric.ml
AegisLabTrojan.Win32.Perseus.4!c
Endgamemalicious (high confidence)
EmsisoftGen:Variant.MSILPerseus.225130 (B)
ComodoMalware@#2ikr0jwjop1uq
F-SecureTrojan.TR/AD.StellarStealer.zeryn
VIPRETrojan.Win32.Generic!BT
Invinceaheuristic
McAfee-GW-EditionBehavesLike.Win32.Generic.cc
FortinetMSIL/Kryptik.WAT!tr
SophosMal/Generic-S
CyrenW32/MSIL_Troj.VP.gen!Eldorado
AviraTR/AD.StellarStealer.zeryn
MAXmalware (ai score=83)
ArcabitTrojan.Razy.DA5D38
ZoneAlarmHEUR:Trojan-PSW.MSIL.Agensla.gen
MicrosoftBehavior:Win32/CobaltStrike.B
AhnLab-V3Trojan/Win32.Kryptik.R339425
ALYacGen:Variant.MSILPerseus.225130
Ad-AwareGen:Variant.Razy.679224
MalwarebytesSpyware.AgentTesla
ESET-NOD32a variant of MSIL/Kryptik.WDZ
TrendMicro-HouseCallTROJ_GEN.R002C0DF420
TencentMsil.Trojan-qqpass.Qqrob.Dwjt
YandexTrojan.Kryptik!/MgTNI3Wt3Y
IkarusTrojan-Rat.NanoCore
eGambitUnsafe.AI_Score_99%
GDataGen:Variant.Razy.679224
BitDefenderThetaGen:NN.ZemsilF.34126.2m0@aqvMemo
PandaTrj/GdSda.A
CrowdStrikewin/malicious_confidence_90% (W)

How to remove Behavior:Win32/CobaltStrike.B?

Behavior:Win32/CobaltStrike.B removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment