34 lines
1.1 KiB
YAML
34 lines
1.1 KiB
YAML
id: sliver-c2
|
|
|
|
info:
|
|
name: Sliver C2 - Detect
|
|
author: johnk3r
|
|
severity: info
|
|
description: |
|
|
Sliver is a Command and Control (C2) system made for penetration testers, red teams, and advanced persistent threats. It generates implants (slivers) that can run on virtually every architecture out there, and securely manage these connections through a central server
|
|
reference: |
|
|
https://malpedia.caad.fkie.fraunhofer.de/details/win.sliver
|
|
metadata:
|
|
verified: "true"
|
|
max-request: 1
|
|
shodan-query: product:"Sliver C2"
|
|
tags: c2,ssl,ir,osint,malware,sliver
|
|
ssl:
|
|
- address: "{{Host}}:{{Port}}"
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: issuer_cn
|
|
words:
|
|
- "operators"
|
|
|
|
- type: word
|
|
part: subject_dn
|
|
words:
|
|
- "CN=multiplayer"
|
|
|
|
extractors:
|
|
- type: json
|
|
json:
|
|
- " .issuer_cn"
|
|
# digest: 4a0a0047304502201fe507d08803aa5558ce2c45eb42c2a4a387cfdbe6c5f1b03f5407bfcc3a551f022100f24bfd9664629ded85f8a54221e2ab84cd1e7ce892f03306d4ff20b40b935583:922c64590222798bb761d5b6d8e72950 |