2021-09-17 (FRIDAY) - SQUIRRELWAFFLE LOADER WITH COBALT STRIKE
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
ASSOCIATED FILES:
- 2021-09-17-IOCs-for-Squirrelwaffle-loader-with-Cobalt-Strike.txt.zip   3.6 kB   (3,563 bytes)
- 2021-09-17-Word-docs-for-Squirrelwaffle-Loader-10-examples.zip   1.3 MB   (1,348,874 bytes)
- 2021-09-17-Squirrelwaffle-loader-with-Cobalt-Strike.pcap.zip   7.0 MB   (7,008,533 bytes)
- 2021-09-17-Squirrelwaffle-and-Cobalt-Strike-malware-and-artifacts.zip   559 kB   (559,022 bytes)
NOTES:
- See 2021-09-17-IOCs-for-Squirrelwaffle-loader-with-Cobalt-Strike.txt.zip for more info on Squirrelwaffle Loader and this specific infection.
IMAGES
Shown above: Link for malicious zip archive from an email pushing Squirrelwaffle loader.
Shown above: Word doc extracted from downloaded zip archive.
Shown above: Squirrelwaffle artifacts from an infected Windows host.
Shown above: Traffic from a Squirrelwaffle loader infection filtered in Wireshark.
Shown above: Windows EXE for Cobalt Strike seen as follow-up malware.
Shown above: Traffic filtered in Wireshark showing when Cobalt Strike activity started.
Click here to return to the main page.