Skip to content

Mythic C2 JARM - Detect

ID: mythic-c2-jarm

Severity: info

Author: pussycat0x

Tags: jarm,network,c2,ir,osint,cti,mythic,tcp

A cross-platform, post-exploit, red teaming framework built with python3, docker, docker-compose, and a web browser UI.It’s designed to provide a collaborative and user friendly interface for operators, managers, and reporting throughout red teaming.

id: mythic-c2-jarm
info:
name: Mythic C2 JARM - Detect
author: pussycat0x
severity: info
description: |
A cross-platform, post-exploit, red teaming framework built with python3, docker, docker-compose, and a web browser UI.
It's designed to provide a collaborative and user friendly interface for operators, managers, and reporting throughout red teaming.
reference:
- https://github.com/cedowens/C2-JARM
- https://www.socinvestigation.com/shodan-filters-to-hunt-adversaries-infrastructure-and-c2/
metadata:
max-request: 1
tags: jarm,network,c2,ir,osint,cti,mythic,tcp
tcp:
- inputs:
- data: 2E
type: hex
host:
- "{{Hostname}}"
matchers:
- type: dsl
dsl:
- "jarm(Hostname) == '2ad2ad0002ad2ad00042d42d000000ad9bf51cc3f5a1e29eecb81d0c7b06eb'"
# digest: 4a0a0047304502205bd737c8681177ffaff44567c82ff3cc74a3032b80921850236388b791e45cd2022100e07aebb2591a9d9aa2e976d14f5fc227ff6207ebb642a356adfc52755b25280a:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "network/jarm/c2/mythic-c2-jarm.yaml"

View on Github