id: shadowpad-c2 info: name: ShadowPad C2 Infrastructure - Detect author: pussycat0x severity: info description: | ShadowPad constitutes various plugins having specific functionality and the malware has the capability to “plug” or “unplug” these plugins at run-time in shellcode format. It can also load additional plugins dynamically from the C2 server when required. metadata: verified: "true" max-request: 1 censys-query: services.tls.certificates.leaf_data.subject_dn="C=CN, ST=myprovince, L=mycity, O=myorganization, OU=mygroup, CN=myServer" tags: ssl,tls,c2,ir,osint,malware,shadowpad ssl: - address: "{{Host}}:{{Port}}" matchers: - type: word part: subject_dn words: - "CN=myServer, OU=mygroup, O=myorganization, L=mycity, ST=myprovince, C=CN" extractors: - type: json json: - ".subject_dn" # digest: 4b0a0048304602210080a0e93344e0cac70d7cb7b9b281eceebba5241a354ad0019b7cee450e50dfb5022100f8b38076a771482ecea1f5f4fab9716ba1dfa0b9351bf2e5543354b01f46818d:922c64590222798bb761d5b6d8e72950