id: mythic-c2-jarm info: name: Mythic C2 JARM - Detect author: pussycat0x severity: info description: | A cross-platform, post-exploit, red teaming framework built with python3, docker, docker-compose, and a web browser UI. It's designed to provide a collaborative and user friendly interface for operators, managers, and reporting throughout red teaming. reference: - https://github.com/cedowens/C2-JARM - https://www.socinvestigation.com/shodan-filters-to-hunt-adversaries-infrastructure-and-c2/ metadata: max-request: 1 tags: jarm,c2,ir,osint,cti,mythic tcp: - inputs: - data: 2E type: hex host: - "{{Hostname}}" matchers: - type: dsl dsl: - "jarm(Hostname) == '2ad2ad0002ad2ad00042d42d000000ad9bf51cc3f5a1e29eecb81d0c7b06eb'" # digest: 4a0a00473045022053bbcfb3b7e853168fe4dbe4d9cb3dbbed70e98a6939c40be6c5ecf5509ccb8e022100d0223258c6916b3f86197f70ef36cea11a473c2ada3ca109ac9e78516f9f9201:922c64590222798bb761d5b6d8e72950