Куда я попал?
SECURITM это SGRC система, ? автоматизирующая процессы в службах информационной безопасности. SECURITM помогает построить и управлять ИСПДн, КИИ, ГИС, СМИБ/СУИБ, банковскими системами защиты.
А еще SECURITM это место для обмена опытом и наработками для служб безопасности.

Cobalt Strike

Cobalt Strike is a commercial, full-featured, remote access tool that bills itself as “adversary simulation software designed to execute targeted attacks and emulate the post-exploitation actions of advanced threat actors”. Cobalt Strike’s interactive post-exploit capabilities cover the full range of ATT&CK tactics, all executed within a single, integrated system.(Citation: cobaltstrike manual) In addition to its own capabilities, Cobalt Strike leverages the capabilities of other well-known tools such as Metasploit and Mimikatz.(Citation: cobaltstrike manual)
ID: S0154
Associated Software:
Type: MALWARE
Platforms: Windows
Version: 1.13
Created: 14 Dec 2017
Last Modified: 25 Sep 2024

Associated Software Descriptions

Name Description

Groups That Use This Software

ID Name References
G0079 DarkHydrus

(Citation: Unit 42 DarkHydrus July 2018) (Citation: Unit 42 Playbook Dec 2017)

G0096 APT41

(Citation: FireEye APT41 March 2020)

G0065 Leviathan

(Citation: Proofpoint Leviathan Oct 2017) (Citation: FireEye Periscope March 2018)

G0016 APT29

(Citation: FireEye APT29 Nov 2018)

G1046 Storm-1811

(Citation: Microsoft Storm-1811 2024) (Citation: rapid7-email-bombing)

G0118 UNC2452

(Citation: FireEye SUNBURST Backdoor December 2020)

G0129 Mustang Panda

(Citation: Crowdstrike MUSTANG PANDA June 2018) (Citation: Anomali MUSTANG PANDA October 2019) (Citation: Secureworks BRONZE PRESIDENT December 2019) (Citation: Recorded Future REDDELTA July 2020) (Citation: McAfee Dianxun March 2021)

G0027 Threat Group-3390

(Citation: Trend Micro DRBControl February 2020)

G0050 APT32

(Citation: FireEye APT32 May 2017) (Citation: Volexity OceanLotus Nov 2017) (Citation: Cybereason Oceanlotus May 2017) (Citation: Cybereason Cobalt Kitty 2017) (Citation: Volexity Ocean Lotus November 2020) (Citation: Amnesty Intl. Ocean Lotus February 2021) (Citation: Unit 42 KerrDown February 2019)

G0080 Cobalt Group

(Citation: Talos Cobalt Group July 2018) (Citation: PTSecurity Cobalt Group Aug 2017) (Citation: Group IB Cobalt Aug 2017) (Citation: Proofpoint Cobalt June 2017) (Citation: RiskIQ Cobalt Nov 2017) (Citation: RiskIQ Cobalt Jan 2018) (Citation: Crowdstrike Global Threat Report Feb 2018) (Citation: TrendMicro Cobalt Group Nov 2017)

G1022 ToddyCat

(Citation: Kaspersky ToddyCat Check Logs October 2023)

G0073 APT19

(Citation: FireEye APT19)

G0037 FIN6

(Citation: FireEye FIN6 Apr 2019)

G0052 CopyKittens

(Citation: ClearSky Wilted Tulip July 2017)

G0092 TA505

(Citation: NCC Group TA505)

G0052 CopyKittens

(Citation: ClearSky Wilted Tulip July 2017)

G0079 DarkHydrus

(Citation: Unit 42 DarkHydrus July 2018) (Citation: Unit 42 Playbook Dec 2017)

G0037 FIN6

(Citation: FireEye FIN6 Apr 2019)

G0073 APT19

(Citation: FireEye APT19)

G1040 Play

(Citation: Trend Micro Ransomware Spotlight Play July 2023)

G1006 Earth Lusca

(Citation: TrendMicro EarthLusca 2022)

G0046 FIN7

(Citation: Mandiant FIN7 Apr 2022) (Citation: CrowdStrike Carbon Spider August 2021) (Citation: FBI Flash FIN7 USB)

G1020 Mustard Tempest

(Citation: Microsoft Ransomware as a Service)

G0050 APT32

(Citation: FireEye APT32 May 2017) (Citation: Volexity OceanLotus Nov 2017) (Citation: Cybereason Oceanlotus May 2017) (Citation: Cybereason Cobalt Kitty 2017)

G0096 APT41

(Citation: FireEye APT41 March 2020) (Citation: Group IB APT 41 June 2021)

G0045 menuPass

(Citation: Securelist APT10 March 2021)

G0143 Aquatic Panda

(Citation: CrowdStrike AQUATIC PANDA December 2021)

G0080 Cobalt Group

(Citation: Crowdstrike Global Threat Report Feb 2018) (Citation: TrendMicro Cobalt Group Nov 2017) (Citation: RiskIQ Cobalt Nov 2017) (Citation: RiskIQ Cobalt Jan 2018) (Citation: Group IB Cobalt Aug 2017) (Citation: Proofpoint Cobalt June 2017) (Citation: PTSecurity Cobalt Group Aug 2017) (Citation: Talos Cobalt Group July 2018)

G0034 Sandworm Team

(Citation: mandiant_apt44_unearthing_sandworm)

G1043 BlackByte

(Citation: Picus BlackByte 2022) (Citation: Microsoft BlackByte 2023)

G0065 Leviathan

(Citation: Proofpoint Leviathan Oct 2017) (Citation: FireEye Periscope March 2018) (Citation: CISA AA21-200A APT40 July 2021)

G0016 APT29

(Citation: ESET T3 Threat Report 2021) (Citation: FireEye SUNBURST Backdoor December 2020) (Citation: SentinelOne NobleBaron June 2021) (Citation: MSTIC NOBELIUM May 2021) (Citation: MSTIC Nobelium Toolset May 2021) (Citation: Cybersecurity Advisory SVR TTP May 2021) (Citation: Secureworks IRON RITUAL USAID Phish May 2021) (Citation: Secureworks IRON RITUAL Profile)

G1021 Cinnamon Tempest

(Citation: Microsoft Ransomware as a Service) (Citation: Dell SecureWorks BRONZE STARLIGHT Profile)

G0067 APT37

(Citation: Volexity InkySquid BLUELIGHT August 2021)

G1014 LuminousMoth

(Citation: Bitdefender LuminousMoth July 2021) (Citation: Kaspersky LuminousMoth July 2021)

G0114 Chimera

(Citation: Cycraft Chimera April 2020) (Citation: NCC Group Chimera January 2021)

G0119 Indrik Spider

(Citation: Mandiant_UNC2165) (Citation: Microsoft Ransomware as a Service) (Citation: Crowdstrike EvilCorp March 2021)

G0102 Wizard Spider

(Citation: DHS/CISA Ransomware Targeting Healthcare October 2020) (Citation: FireEye KEGTAP SINGLEMALT October 2020) (Citation: CrowdStrike Wizard Spider October 2020) (Citation: Sophos New Ryuk Attack October 2020) (Citation: Mandiant FIN12 Oct 2021) (Citation: DFIR Ryuk 2 Hour Speed Run November 2020) (Citation: DFIR Ryuk in 5 Hours October 2020) (Citation: DFIR Ryuk's Return October 2020)

G0114 Chimera

(Citation: Cycraft Chimera April 2020)

References

  1. Mudge, R. (2017, January 24). Scripting Matt Nelson’s MMC20.Application Lateral Movement Technique. Retrieved November 21, 2017.
  2. Amnesty International. (2021, February 24). Vietnamese activists targeted by notorious hacking group. Retrieved March 1, 2021.
  3. Cobalt Strike. (2017, December 8). Tactics, Techniques, and Procedures. Retrieved November 17, 2024.
  4. Cobalt Strike. (2017, December 8). Tactics, Techniques, and Procedures. Retrieved December 20, 2017.
  5. Strategic Cyber LLC. (2020, November 5). Cobalt Strike: Advanced Threat Tactics for Penetration Testers. Retrieved April 13, 2021.
  6. Cybereason. (2022, August 17). Bumblebee Loader – The High Road to Enterprise Domain Control. Retrieved August 29, 2022.
  7. Strategic Cyber, LLC. (n.d.). Scripted Web Delivery. Retrieved January 23, 2018.
  8. Mavis, N. (2020, September 21). The Art and Science of Detecting Cobalt Strike. Retrieved September 12, 2024.
  9. Kenefick, I. et al. (2022, October 12). Black Basta Ransomware Gang Infiltrates Networks via QAKBOT, Brute Ratel, and Cobalt Strike. Retrieved February 6, 2023.
  10. Unit 42. (2017, December 15). Unit 42 Playbook Viewer. Retrieved December 20, 2017.
  11. Falcone, R., et al. (2018, July 27). New Threat Actor Group DarkHydrus Targets Middle East Government. Retrieved August 2, 2018.
  12. Strategic Cyber LLC. (2017, March 14). Cobalt Strike Manual. Retrieved May 24, 2017.
  13. Strategic Cyber LLC. (2017, March 14). Cobalt Strike Manual. Retrieved May 24, 2017.
  14. DFIR Report. (2021, November 29). CONTInuing the Bazar Ransomware Story. Retrieved September 29, 2022.
  15. Dahan, A. et al. (2019, December 11). DROPPING ANCHOR: FROM A TRICKBOT INFECTION TO THE DISCOVERY OF THE ANCHOR MALWARE. Retrieved September 10, 2020.
  16. Mudge, R. (2017, May 23). Cobalt Strike 3.8 – Who’s Your Daddy?. Retrieved June 4, 2019.
  17. Mudge, R. (2014, July 14). Github Malleable-C2-Profiles safebrowsing.profile. Retrieved June 18, 2017.
  18. Dedola, G. et al. (2023, October 12). ToddyCat: Keep calm and check logs. Retrieved January 3, 2024.
  19. GREAT. (2021, March 30). APT10: sophisticated multi-layered loader Ecipekac discovered in A41APT campaign. Retrieved June 17, 2021.

Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.