26 lines
972 B
YAML
26 lines
972 B
YAML
id: cobalt-strike-c2-jarm
|
|
|
|
info:
|
|
name: Cobalt Strike C2 JARM - Detect
|
|
author: pussycat0x
|
|
severity: info
|
|
description: |
|
|
Cobalt Strike gives you a post-exploitation agent and covert channels to emulate a quiet long-term embedded actor in your customer's network.
|
|
reference:
|
|
- https://blog.sekoia.io/hunting-and-detecting-cobalt-strike/
|
|
metadata:
|
|
verified: true
|
|
max-request: 1
|
|
shodan-query: ssl.jarm:07d14d16d21d21d07c42d41d00041d24a458a375eef0c576d23a7bab9a9fb1+port:443
|
|
tags: jarm,network,c2,ir,osint,cti,cobalt-strike
|
|
tcp:
|
|
- inputs:
|
|
- data: 2E
|
|
type: hex
|
|
host:
|
|
- "{{Hostname}}"
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- "jarm(Hostname) == '07d14d16d21d21d07c42d41d00041d24a458a375eef0c576d23a7bab9a9fb1'"
|
|
# digest: 4a0a00473045022100f65397b73a088ed7ab726da5d0897335cfedb395cb41d0eedb50b2bb8bd2b8170220603f64cf19297f46c986877e20781f83f45bb8cc6e5a3b8c98c281d28c6288b8:922c64590222798bb761d5b6d8e72950 |