Malware-Traffic-Analysis.net - 2021-09-17 (Friday) - Squirrelwaffle Loader with Cobalt Strike Archived: 2026-04-05 14:20:23 UTC NOTICE: The zip archives on this page have been updated, and they now use the new password scheme.  For the new password, see the "about" page of this website. ASSOCIATED FILES: 2021-09-17-IOCs-for-Squirrelwaffle-loader-with-Cobalt-Strike.txt.zip   3.6 kB   (3,563 bytes) 2021-09-17-Word-docs-for-Squirrelwaffle-Loader-10-examples.zip   1.3 MB   (1,348,874 bytes) 2021-09-17-Squirrelwaffle-loader-with-Cobalt-Strike.pcap.zip   7.0 MB   (7,008,533 bytes) 2021-09-17-Squirrelwaffle-and-Cobalt-Strike-malware-and-artifacts.zip   559 kB   (559,022 bytes) NOTES: See 2021-09-17-IOCs-for-Squirrelwaffle-loader-with-Cobalt-Strike.txt.zip for more info on Squirrelwaffle Loader and this specific infection. IMAGES Shown above:  Link for malicious zip archive from an email pushing Squirrelwaffle loader. https://www.malware-traffic-analysis.net/2021/09/17/index.html Page 1 of 4 Shown above:  Word doc extracted from downloaded zip archive. Shown above:  Squirrelwaffle artifacts from an infected Windows host. https://www.malware-traffic-analysis.net/2021/09/17/index.html Page 2 of 4 Shown above:  Traffic from a Squirrelwaffle loader infection filtered in Wireshark. Shown above:  Windows EXE for Cobalt Strike seen as follow-up malware. Shown above:  Traffic filtered in Wireshark showing when Cobalt Strike activity started. https://www.malware-traffic-analysis.net/2021/09/17/index.html Page 3 of 4 Click here to return to the main page. Source: https://www.malware-traffic-analysis.net/2021/09/17/index.html https://www.malware-traffic-analysis.net/2021/09/17/index.html Page 4 of 4