Score: | 72 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Cobalt Strike, CobaltStrike | Cobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable. |
|
|
AV Detection |
---|
Source: |
Avira: |
System Summary |
---|
Source: |
Matched rule: |
Source: |
Matched rule: |
Source: |
Classification label: |
Source: |
Mutant created: |
Source: |
Process created: |
Source: |
Process created: |
||
Source: |
Process created: |
Source: |
Section loaded: |
Jump to behavior |
Source: |
Process information set: |
Jump to behavior |
Source: |
Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: |
Thread injection, dropped files, key value created, disk infection and DNS query: |
Remote Access Functionality |
---|
Source: |
File source: |
Source: |
File source: |