2023-07-14 08:02:24 +00:00
|
|
|
id: mythic-c2-jarm
|
|
|
|
|
|
|
|
info:
|
|
|
|
name: Mythic C2 JARM - Detect
|
|
|
|
author: pussycat0x
|
|
|
|
severity: info
|
|
|
|
description: |
|
|
|
|
A cross-platform, post-exploit, red teaming framework built with python3, docker, docker-compose, and a web browser UI.
|
|
|
|
It's designed to provide a collaborative and user friendly interface for operators, managers, and reporting throughout red teaming.
|
|
|
|
reference:
|
|
|
|
- https://github.com/cedowens/C2-JARM
|
|
|
|
- https://www.socinvestigation.com/shodan-filters-to-hunt-adversaries-infrastructure-and-c2/
|
2023-07-18 08:23:15 +00:00
|
|
|
metadata:
|
|
|
|
max-request: 1
|
2024-04-08 11:34:33 +00:00
|
|
|
tags: jarm,network,c2,ir,osint,cti,mythic
|
2023-07-14 08:02:24 +00:00
|
|
|
tcp:
|
|
|
|
- inputs:
|
|
|
|
- data: 2E
|
|
|
|
type: hex
|
|
|
|
host:
|
|
|
|
- "{{Hostname}}"
|
|
|
|
matchers:
|
|
|
|
- type: dsl
|
|
|
|
dsl:
|
2023-10-14 11:27:55 +00:00
|
|
|
- "jarm(Hostname) == '2ad2ad0002ad2ad00042d42d000000ad9bf51cc3f5a1e29eecb81d0c7b06eb'"
|
2024-01-26 08:31:11 +00:00
|
|
|
# digest: 4a0a0047304502202afd75e4ff7e78275f58a2dd29f0d6129f16e689f1723fe850628eec4a67427002210080b89e9326c377020b35761252402d6e1bb276e55d9a7ec37c0537e37d635c67:922c64590222798bb761d5b6d8e72950
|