Skip to content

Cobalt Strike C2 JARM - Detect

ID: cobalt-strike-c2-jarm

Severity: info

Author: pussycat0x

Tags: jarm,network,c2,ir,osint,cti,cobalt-strike,tcp

Cobalt Strike gives you a post-exploitation agent and covert channels to emulate a quiet long-term embedded actor in your customer’s network.

id: cobalt-strike-c2-jarm
info:
name: Cobalt Strike C2 JARM - Detect
author: pussycat0x
severity: info
description: |
Cobalt Strike gives you a post-exploitation agent and covert channels to emulate a quiet long-term embedded actor in your customer's network.
reference:
- https://blog.sekoia.io/hunting-and-detecting-cobalt-strike/
metadata:
verified: true
max-request: 1
shodan-query: ssl.jarm:07d14d16d21d21d07c42d41d00041d24a458a375eef0c576d23a7bab9a9fb1+port:443
tags: jarm,network,c2,ir,osint,cti,cobalt-strike,tcp
tcp:
- inputs:
- data: 2E
type: hex
host:
- "{{Hostname}}"
matchers:
- type: dsl
dsl:
- "jarm(Hostname) == '07d14d16d21d21d07c42d41d00041d24a458a375eef0c576d23a7bab9a9fb1'"
# digest: 490a0046304402207181a9b399779182cfcef22c4b5802e38a35119e9540d44327dcbb17bc057b4702204cec60ca1fcb0eaff9ba2a5d28542309d21597bdf48e6583f2b83d22f88d73bf:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "network/jarm/c2/cobalt-strike-c2-jarm.yaml"

View on Github