Files
nuclei-templates/ssl/c2/cobalt-strike-c2.yaml
2025-10-26 16:17:37 +00:00

27 lines
897 B
YAML

id: cobalt-strike-c2
info:
name: Cobalt Strike C2 - Detect
author: pussycat0x
severity: info
description: |
Cobalt Strike gives you a post-exploitation agent and covert channels to emulate a quiet long-term embedded actor in your customer's network.
reference:
- https://blog.sekoia.io/hunting-and-detecting-cobalt-strike/
metadata:
verified: "true"
max-request: 1
shodan-query: ssl.cert.serial:146473198
tags: c2,ssl,tls,ir,osint,malware,panel,cobalt-strike,discovery
ssl:
- address: "{{Host}}:{{Port}}"
matchers:
- type: dsl
dsl:
- 'contains(serial,"08:BB:00:EE")'
extractors:
- type: json
json:
- ".serial"
# digest: 4a0a00473045022100cc45d6fa64d6b3417e23f8f48c240d83fa7da68b25371e0e654a021d2a02976602204df0419bcd3162b17a7fbfa9ccd5541d3fdae7d67aee3418a88bb56dadcb5215:922c64590222798bb761d5b6d8e72950