nuclei-templates/ssl/c2/cobalt-strike-c2.yaml

27 lines
885 B
YAML
Raw Normal View History

2023-03-18 19:25:58 +00:00
id: cobalt-strike-c2
info:
name: Cobalt Strike C2 - Detect
author: pussycat0x
severity: info
description: |
2023-10-14 11:27:55 +00:00
Cobalt Strike gives you a post-exploitation agent and covert channels to emulate a quiet long-term embedded actor in your customer's network.
2023-03-18 19:25:58 +00:00
reference:
- https://blog.sekoia.io/hunting-and-detecting-cobalt-strike/
metadata:
verified: "true"
2023-10-14 11:27:55 +00:00
max-request: 1
2023-03-18 19:25:58 +00:00
shodan-query: ssl.cert.serial:146473198
2024-01-14 09:21:50 +00:00
tags: c2,ssl,tls,ir,osint,malware,panel,cobalt-strike
2023-03-18 19:25:58 +00:00
ssl:
- address: "{{Host}}:{{Port}}"
matchers:
- type: dsl
dsl:
- 'contains(serial,"08:BB:00:EE")'
extractors:
- type: json
json:
2023-03-19 17:06:14 +00:00
- ".serial"
# digest: 490a0046304402200fd327e9fb1b939be18d97fea73e8bd095ac57861ac0bc2dcb656787a5bec893022078bc79bf76b744266065b178c7a2ec83187179a45eff17225e15b9eada4d2c45:922c64590222798bb761d5b6d8e72950