user@threatcheck.sh ~ threat-analysis
bash
$ analyze-threat Trojan:Win64/CobaltStrike.GZQ!MTB
Trojan:Win64/CobaltStrike.GZQ!MTB - Windows Defender threat signature analysis

Trojan:Win64/CobaltStrike.GZQ!MTB - Windows Defender Threat Analysis

$ cat analysis.txt
=== THREAT ANALYSIS REPORT ===
Threat Name: Trojan:Win64/CobaltStrike.GZQ!MTB
Classification:
Type:Trojan
Platform:Win64
Family:CobaltStrike
Detection Type:Concrete
Known malware family with identified signatures
Variant:GZQ
Specific signature variant within the malware family
Suffix:!MTB
Detected via machine learning and behavioral analysis
Detection Method:Behavioral
Confidence:Very High
False-Positive Risk:Low

Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 64-bit Windows platform, family CobaltStrike

Summary:

This detection identifies Trojan:Win64/CobaltStrike.GZQ, a concrete instance of the highly sophisticated CobaltStrike post-exploitation framework, confirmed with machine learning behavioral analysis. CobaltStrike is frequently abused by threat actors for establishing command and control, lateral movement, and data exfiltration within compromised networks, posing a significant threat.

Severity:
Critical
VDM Static Detection:
No specific strings found for this threat
YARA Rule:
rule Trojan_Win64_CobaltStrike_GZQ_2147946290_0
{
    meta:
        author = "threatcheck.sh"
        detection_name = "Trojan:Win64/CobaltStrike.GZQ!MTB"
        threat_id = "2147946290"
        type = "Trojan"
        platform = "Win64: Windows 64-bit platform"
        family = "CobaltStrike"
        severity = "Critical"
        info = "MTB: Microsoft Threat Behavior"
        signature_type = "SIGNATURE_TYPE_PEHSTR_EXT"
        threshold = "10"
        strings_accuracy = "Low"
    strings:
        $x_10_1 = {44 88 3c 30 48 ff c6 48 89 b5 ?? ?? ?? ?? 48 81 fe ?? ?? ?? ?? ?? ?? 89 f0 83 e0 0f 46 0f b6 3c 36 44 32 bc 05 ?? ?? ?? ?? 48 3b b5}  //weight: 10, accuracy: Low
    condition:
        (filesize < 20MB) and
        (all of ($x*))
}
Known malware which is associated with this threat:
Filename: 1c38e3cda8ac6d79d9da40834367697a209c6b07e6b3ab93b3a4f375b161a901
1c38e3cda8ac6d79d9da40834367697a209c6b07e6b3ab93b3a4f375b161a901
14/12/2025
Remediation Steps:
Immediately isolate the affected system to contain the threat and prevent further compromise. Conduct a comprehensive incident response investigation to determine the initial access vector, the extent of the breach, and any persistent mechanisms. Perform full system remediation, including malware removal and patching, and reset any potentially compromised credentials.
=== END REPORT ===
$ reanalyze-threat
This analysis was last updated on 14/12/2025. Do you want to analyze it again?
$ ls available-commands/
user@threatcheck.sh:~$