SLOW#TEMPEST Cobalt Strike Loader
NetmanageIT OpenCTI - opencti.netmanageit.com

SUMMARY :
An ISO image containing a malicious Cobalt Strike loader was discovered, targeting Chinese-speaking users. The infection chain involves a deceptive LNK file, which executes a legitimate Alibaba executable to sideload a malicious DLL. The loader implements anti-analysis techniques, decrypts an embedded payload, and injects a Cobalt Strike beacon. The beacon is configured to mimic Bilibili traffic and communicates with a specific C2 server. The loader also patches the entry point of the loading executable with an infinite loop. This activity shares similarities with previously reported SLOW#TEMPEST campaigns, including targeting, folder structures, and the use of DLL sideloading for Cobalt Strike beacons.
OPENCTI LABELS :
cobalt strike,anti-analysis,beacon,dll-sideloading,entry-point-patching,chinese-targets,cobalt-strike,iso-image
Open in NetmanageIT OpenCTI Public Instance with below link!
Use public read only username and password on login page.
NOTE : Use Public READ only user credentials on login page banner.
SLOW#TEMPEST Cobalt Strike Loader