nuclei-templates/network/jarm/c2/cobalt-strike-c2-jarm.yaml

26 lines
962 B
YAML

id: cobalt-strike-c2-jarm
info:
name: Cobalt Strike C2 JARM - Detect
author: pussycat0x
severity: info
description: |
Cobalt Strike gives you a post-exploitation agent and covert channels to emulate a quiet long-term embedded actor in your customer's network.
reference:
- https://blog.sekoia.io/hunting-and-detecting-cobalt-strike/
metadata:
verified: true
max-request: 1
shodan-query: ssl.jarm:07d14d16d21d21d07c42d41d00041d24a458a375eef0c576d23a7bab9a9fb1+port:443
tags: jarm,c2,ir,osint,cti,cobalt-strike
tcp:
- inputs:
- data: 2E
type: hex
host:
- "{{Hostname}}"
matchers:
- type: dsl
dsl:
- "jarm(Hostname) == '07d14d16d21d21d07c42d41d00041d24a458a375eef0c576d23a7bab9a9fb1'"
# digest: 490a0046304402207bbab75320505085b447bbcb7fadcf6bbbaeb867a1df49e7cebb3b052a20705102200259ca7e2e65bf5a5f63f9ec62711f86914bfdd56c71254a5c9b9987bf44133e:922c64590222798bb761d5b6d8e72950