{
	"id": "7cf67dc3-61a6-450b-800e-a0f6da8bbc03",
	"created_at": "2026-04-06T00:11:33.366073Z",
	"updated_at": "2026-04-10T03:24:23.960595Z",
	"deleted_at": null,
	"sha1_hash": "308eb286ad5a6c75ea3c223972b18308d129b619",
	"title": "Malware-Traffic-Analysis.net - 2021-09-17 (Friday) - Squirrelwaffle Loader with Cobalt Strike",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 2846907,
	"plain_text": "Malware-Traffic-Analysis.net - 2021-09-17 (Friday) -\r\nSquirrelwaffle Loader with Cobalt Strike\r\nArchived: 2026-04-05 14:20:23 UTC\r\nNOTICE:\r\nThe zip archives on this page have been updated, and they now use the new password scheme.  For the new\r\npassword, see the \"about\" page of this website.\r\nASSOCIATED FILES:\r\n2021-09-17-IOCs-for-Squirrelwaffle-loader-with-Cobalt-Strike.txt.zip   3.6 kB   (3,563 bytes)\r\n2021-09-17-Word-docs-for-Squirrelwaffle-Loader-10-examples.zip   1.3 MB   (1,348,874 bytes)\r\n2021-09-17-Squirrelwaffle-loader-with-Cobalt-Strike.pcap.zip   7.0 MB   (7,008,533 bytes)\r\n2021-09-17-Squirrelwaffle-and-Cobalt-Strike-malware-and-artifacts.zip   559 kB   (559,022 bytes)\r\nNOTES:\r\nSee 2021-09-17-IOCs-for-Squirrelwaffle-loader-with-Cobalt-Strike.txt.zip for more info on Squirrelwaffle\r\nLoader and this specific infection.\r\nIMAGES\r\nShown above:  Link for malicious zip archive from an email pushing Squirrelwaffle loader.\r\nhttps://www.malware-traffic-analysis.net/2021/09/17/index.html\r\nPage 1 of 4\n\nShown above:  Word doc extracted from downloaded zip archive.\r\nShown above:  Squirrelwaffle artifacts from an infected Windows host.\r\nhttps://www.malware-traffic-analysis.net/2021/09/17/index.html\r\nPage 2 of 4\n\nShown above:  Traffic from a Squirrelwaffle loader infection filtered in Wireshark.\r\nShown above:  Windows EXE for Cobalt Strike seen as follow-up malware.\r\nShown above:  Traffic filtered in Wireshark showing when Cobalt Strike activity started.\r\nhttps://www.malware-traffic-analysis.net/2021/09/17/index.html\r\nPage 3 of 4\n\nClick here to return to the main page.\r\nSource: https://www.malware-traffic-analysis.net/2021/09/17/index.html\r\nhttps://www.malware-traffic-analysis.net/2021/09/17/index.html\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"references": [
		"https://www.malware-traffic-analysis.net/2021/09/17/index.html"
	],
	"report_names": [
		"index.html"
	],
	"threat_actors": [
		{
			"id": "610a7295-3139-4f34-8cec-b3da40add480",
			"created_at": "2023-01-06T13:46:38.608142Z",
			"updated_at": "2026-04-10T02:00:03.03764Z",
			"deleted_at": null,
			"main_name": "Cobalt",
			"aliases": [
				"Cobalt Group",
				"Cobalt Gang",
				"GOLD KINGSWOOD",
				"COBALT SPIDER",
				"G0080",
				"Mule Libra"
			],
			"source_name": "MISPGALAXY:Cobalt",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		}
	],
	"ts_created_at": 1775434293,
	"ts_updated_at": 1775791463,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/308eb286ad5a6c75ea3c223972b18308d129b619.pdf",
		"text": "https://archive.orkl.eu/308eb286ad5a6c75ea3c223972b18308d129b619.txt",
		"img": "https://archive.orkl.eu/308eb286ad5a6c75ea3c223972b18308d129b619.jpg"
	}
}