Contact

SLOW#TEMPEST Cobalt Strike Loader

NetmanageIT OpenCTI - opencti.netmanageit.com

SLOW#TEMPEST Cobalt Strike Loader



SUMMARY :

An ISO image containing a malicious Cobalt Strike loader was discovered, targeting Chinese-speaking users. The infection chain involves a deceptive LNK file, which executes a legitimate Alibaba executable to sideload a malicious DLL. The loader implements anti-analysis techniques, decrypts an embedded payload, and injects a Cobalt Strike beacon. The beacon is configured to mimic Bilibili traffic and communicates with a specific C2 server. The loader also patches the entry point of the loading executable with an infinite loop. This activity shares similarities with previously reported SLOW#TEMPEST campaigns, including targeting, folder structures, and the use of DLL sideloading for Cobalt Strike beacons.

OPENCTI LABELS :

cobalt strike,anti-analysis,beacon,dll-sideloading,entry-point-patching,chinese-targets,cobalt-strike,iso-image


Open in NetmanageIT OpenCTI Public Instance with below link!


Use public read only username and password on login page.

NOTE : Use Public READ only user credentials on login page banner.


SLOW#TEMPEST Cobalt Strike Loader