Cobalt Strike - Detection Rate

VirusTotal detection statistics across 10 analyzed samples.

Last updated: 2026-05-16

Detection rates show how many antivirus engines on VirusTotal identify Cobalt Strike samples as malicious. A high detection rate (30+ engines) means most AV vendors have signatures for the variant. Low or zero detection indicates recently packed or obfuscated samples that may bypass signature-based endpoint protection.

Why Detection Rate Matters

For SOC analysts and threat hunters, detection rate is a key indicator of variant freshness and evasion capability. When Cobalt Strike operators release a new build with updated packing or obfuscation, detection rates drop temporarily until AV vendors update their signatures. This window of low detection is when organizations are most vulnerable. Monitoring this page helps you understand how well your current defenses cover Cobalt Strike variants.

Recommended Actions

If you see undetected or low-detection samples, consider submitting them to your sandbox for behavioral analysis. Update your YARA rules to catch Cobalt Strike patterns that signature-based detection misses. For the latest sample hashes to cross-reference, visit the Cobalt Strike samples page. For network-level indicators, check the IOC page.

34/68
Avg Detection
10
Samples Analyzed
7
High Detection
0
Undetected

Detection Distribution

High (30+) 7 (70%)
Medium (15-29) 2 (20%)
Low (1-14) 1 (10%)
Undetected (0) 0 (0%)

Per-Sample Detection

SHA256 Detection Threat Name
179dcccf0614360e... 54/70 trojan.cobaltstrike/dump
4772d85990eb9ab0... 47/71 trojan.fscan/cobaltstrike
03ca7bcc97fccc10... 43/66 trojan.fscan/cobaltstrike
5772c238fa72be7c... 43/71 trojan.cobeacon/meterpretersc
5b50ecba3041b74c... 40/70 trojan.lazy/hack
123b6141959b472d... 35/68 trojan.cobaltstrike
37a82b306178d9bf... 32/64 trojan.meterpreter
7b2b66166e8fa2fd... 22/70 trojan.cobaltstrike/cobeacon
94ac8014079db751... 16/65 trojan.cobaltstrike
9f238ad7ee69f9a5... 11/65 trojan.cobaltstrike/farfli