nuclei-templates/ssl/c2/shadowpad-c2.yaml

26 lines
1.1 KiB
YAML

id: shadowpad-c2
info:
name: ShadowPad C2 Infrastructure - Detect
author: pussycat0x
severity: info
description: |
ShadowPad constitutes various plugins having specific functionality and the malware has the capability to “plug” or “unplug” these plugins at run-time in shellcode format. It can also load additional plugins dynamically from the C2 server when required.
metadata:
verified: "true"
max-request: 1
censys-query: services.tls.certificates.leaf_data.subject_dn="C=CN, ST=myprovince, L=mycity, O=myorganization, OU=mygroup, CN=myServer"
tags: ssl,tls,c2,ir,osint,malware,shadowpad
ssl:
- address: "{{Host}}:{{Port}}"
matchers:
- type: word
part: subject_dn
words:
- "CN=myServer, OU=mygroup, O=myorganization, L=mycity, ST=myprovince, C=CN"
extractors:
- type: json
json:
- ".subject_dn"
# digest: 4b0a0048304602210080a0e93344e0cac70d7cb7b9b281eceebba5241a354ad0019b7cee450e50dfb5022100f8b38076a771482ecea1f5f4fab9716ba1dfa0b9351bf2e5543354b01f46818d:922c64590222798bb761d5b6d8e72950