soka(@pentest_soka) 's Twitter Profile Photo

I wrote a blog about Cobalt Strike beacon monitoring, Windows tokens and Kerberos persistence. Check it out sokarepo.github.io/redteam/2024/0…

account_circle
Brad(@malware_traffic) 's Twitter Profile Photo

Unit 42 A of the infection traffic leading to the DLL along with the associated malware/artifacts are available at malware-traffic-analysis.net/2024/04/18/ind…

@Unit42_Intel A #pcap of the #SSLoad infection traffic leading to the #CobaltStrike DLL along with the associated malware/artifacts are available at malware-traffic-analysis.net/2024/04/18/ind…
account_circle
Chris Pardue(@cpardue09) 's Twitter Profile Photo

-s :malware_traffic: Unit 42 A of the infection traffic leading to the DLL along with the associated malware/artifacts are available at malware-traffic-analysis.net/2024/04/18/ind…

#ln -s :malware_traffic: @Unit42_Intel A #pcap of the #SSLoad infection traffic leading to the #CobaltStrike DLL along with the associated malware/artifacts are available at malware-traffic-analysis.net/2024/04/18/ind…
account_circle
sicehice(@sicehice) 's Twitter Profile Photo

attempt targeting -2018-7600

Spread.exe is a that also connects to 116.213.40.102:9999 🇭🇰
Same IP was a server back on 2023-12-31

2024-04-17 15:17:52 UTC
Source IP: 206.238.221.2 🇸🇬
POST /user/register?element_parents=account/mail/

#RCE attempt targeting #Drupal #CVE-2018-7600

Spread.exe is a #coinminer that also connects to 116.213.40.102:9999 🇭🇰 
Same IP was a #cobaltstrike server back on 2023-12-31

2024-04-17 15:17:52 UTC
Source IP: 206.238.221.2 🇸🇬
POST /user/register?element_parents=account/mail/
account_circle
C2IntelFeedsBot(@drb_ra) 's Twitter Profile Photo

Cobalt Strike Server Found
C2: HTTP @ 173[.]44[.]141[.]234:80
C2 Server: 173[.]44[.]141[.]234,/jquery-3[.]3[.]1[.]min[.]js
Country: United States (AS62904)
ASN: AS62904

account_circle
HP Wolf Security(@hpsecurity) 's Twitter Profile Photo

🍓🐦 is putting organizations at risk by acting as a precursor to other malware families, including , and

And what’s worse, a new campaign is slipping through unnoticed: ow.ly/4OL150RcvXl

#RaspberryRobin 🍓🐦 is putting organizations at risk by acting as a precursor to other malware families, including #SocGholish, #IcedID and #CobaltStrike

And what’s worse, a new campaign is slipping through unnoticed: ow.ly/4OL150RcvXl
account_circle
Clandestine(@akaclandestine) 's Twitter Profile Photo

GitHub - Apr4h/CobaltStrikeScan: Scan files or process memory for CobaltStrike beacons and parse their configuration github.com/Apr4h/CobaltSt…

account_circle
C2IntelFeedsBot(@drb_ra) 's Twitter Profile Photo

Cobalt Strike Server Found
C2: HTTPS @ 109[.]120[.]178[.]253:443
C2 Server: 109[.]120[.]178[.]253,/__utm[.]gif
Country: France (AS210644)
ASN: AEZA-AS

account_circle
Chris Pardue(@cpardue09) 's Twitter Profile Photo

-s :malware_traffic: RT Unit 42: 2024-04-18 (Thursday): infection leads to DLL. In this case we saw no follow-up Cobalt Strike C2 tr…

account_circle
Aaron Jornet(@RexorVc0) 's Twitter Profile Photo



💥[T1204] Rust Loader execution
🧩[T1027] Encode info (XOR)
🪢[T1140] Decode info
🔃[T1620] Load SC in memory
🛠️[S0154] CobaltStrike usage
🔍[T1021] SMB CobaltStrike
📡[T1071] Beacon communication

#TTP

💥[T1204] Rust Loader execution
🧩[T1027] Encode info (XOR)
🪢[T1140] Decode info
🔃[T1620] Load SC in memory
🛠️[S0154] CobaltStrike usage
🔍[T1021] SMB CobaltStrike
📡[T1071] Beacon #C2 communication
account_circle
C2IntelFeedsBot(@drb_ra) 's Twitter Profile Photo

Cobalt Strike Server Found
C2: HTTP @ 106[.]54[.]236[.]42:8443
C2 Server: 172[.]247[.]189[.]234,/Claim/v5[.]6/ZZ1QB9MLS
Country: China (AS45090)
ASN: TENCENT-NET-AP Shenz...

account_circle
C2IntelFeedsBot(@drb_ra) 's Twitter Profile Photo

Cobalt Strike Server Found
C2: HTTPS @ 175[.]178[.]160[.]155:4443
C2 Server: 175[.]178[.]160[.]155,/Complete/pr/H6TCQRWR
Country: China (AS45090)
ASN: TENCENT-NET-AP Shenz...

account_circle
C2IntelFeedsBot(@drb_ra) 's Twitter Profile Photo

Cobalt Strike Server Found
C2: HTTPS @ 185[.]196[.]9[.]234:443
C2 Server: 1488[.]winstate[.]cc,/fwlink
Country: Italy (AS42624)
ASN: SIMPLECARRIER

account_circle
C2IntelFeedsBot(@drb_ra) 's Twitter Profile Photo

Cobalt Strike Server Found
C2: HTTPS @ 43[.]134[.]233[.]227:443
C2 Server: kh1[.]userjoy[.]com,/ca
Country: Singapore (AS132203)
ASN: TENCENT-NET-AP-CN Te...
Host Header: cloud[.]tencent-cs[.]com

account_circle
C2IntelFeedsBot(@drb_ra) 's Twitter Profile Photo

Cobalt Strike Server Found
C2: HTTP @ 43[.]143[.]168[.]206:81
C2 Server: 43[.]143[.]168[.]206,/jquerys-6[.]3[.]5[.]max[.]js
Country: China (AS45090)
ASN: TENCENT-NET-AP Shenz...

account_circle
C2IntelFeedsBot(@drb_ra) 's Twitter Profile Photo

Cobalt Strike Server Found
C2: HTTPS @ 111[.]230[.]25[.]167:443
C2 Server: service-lj3klqg6-1308639534[.]gz[.]tencentapigw[.]com[.]cn,/api/getit
Country: China (AS45090)
ASN: TENCENT-NET-AP Shenz...

account_circle
C2IntelFeedsBot(@drb_ra) 's Twitter Profile Photo

Cobalt Strike Server Found
C2: HTTPS @ 124[.]222[.]173[.]133:443
C2 Server: 124[.]222[.]173[.]133,/jquery-3[.]3[.]1[.]min[.]js
Country: China (AS45090)
ASN: TENCENT-NET-AP Shenz...
Host Header: codasdase[.]jquery[.]com

account_circle
C2IntelFeedsBot(@drb_ra) 's Twitter Profile Photo

Cobalt Strike Server Found
C2: HTTPS @ 43[.]143[.]168[.]206:443
C2 Server: service-e1idmqlj-1259321672[.]bj[.]tencentapigw[.]com[.]cn,/api/x
Country: China (AS45090)
ASN: TENCENT-NET-AP Shenz...

account_circle
C2IntelFeedsBot(@drb_ra) 's Twitter Profile Photo

Cobalt Strike Server Found
C2: HTTPS @ 175[.]178[.]160[.]155:443
C2 Server: jxvtcm[.]cn,/Complete/pr/H6TCQRWR
Country: China (AS45090)
ASN: TENCENT-NET-AP Shenz...

account_circle