Cobalt Stike Beacon Detected – 104[.]194[.]78[.]39:2083

Cobalt Strike Beacon Detection Alerts

The Information provided at the time of posting was detected as “Cobalt Strike”. Depending on when you are viewing this article, it may no longer be the case and could be determined as being a false positive. Please do your own additional validation. – RedPacket Security

TimeStamp 2021-11-09T21:16:52.624205

Cobalt Strike
Cobalt Strike

General Information

2.5744590392211785e+47
Cloud Provider
Cloud Region
Service
Domainslocaldomain[.]
Hostnamessnappy-codes-2[.]localdomain
HTTP Host104[.]194[.]78[.]39
ISPIT7 Networks Inc
ORGIT7 Networks Inc
OSN/A
HTTPN/A
HTTP HTML HASHN/A
HTTP LOCATION/
HTTP REDIRECTS
HTTP ROBOTSN/A
HTTP ROBOTS HASHN/A
HTTP SECURITY.TXTN/A
HTTP SECURITY.TXT HASHN/A
HTTP SERVERN/A
HTTP SITEMAPN/A
HTTP SITEMAP HASHN/A
HTTP TITLEN/A
LOCATION (AREA CODE)N/A
LOCATION (CITY)Los Angeles
LOCATION (COUNTRY CODE)US
LOCATION (COUNTRY NAME)United States
LOCATION (LATITUDE)34.0443
LOCATION (LONGITUDE)-118.2509
LOCATION (POSTAL CODE)N/A
SSL SERIAL
SSL EXPIREDN/A
SSL FINGERPRINT (SHA1)ded15503648f56c414281e5aa6cbf5b9e4f8e53d
SSL ISSUED20210514033300Z
SSL EXPIRES20360510033300Z
SSL CYPHERECDHE-RSA-AES256-GCM-SHA384
SSL VERSIONTLSv1/SSLv3
SSL TRUST (REVOKED)N/A
TAGS


Cobalt Strike Beacon Information

Beacon TypeHTTPS
http-get.client__cfduid=, Cookie, Host: cloudfront[.]net, Accept: text/html,application/xhtml+xml,application/xml;q=0[.]9,*/*;q=0[.]8, Accept-Language: en-US,en;q=0[.]5, Accept-Encoding: gzip, deflate, DNT: 1
http-post.clientHost: cloudfront[.]net, ui=d3244c4707, hop=6928632, start=0, Content-Type: application/x-www-form-urlencoded;charset=utf-8, __cfduid=, Cookie
DNS Beacon MaxDNS255
DNS Beacon Idle134743044
Beacon Jitter15
dns-beacon.strategy_fail_secondsN/A
dns-beacon.strategy_rotate_secondsN/A
dns-beacon.strategy_fail_xN/A
HTTP GET URIwww-flashplayer[.]ml,/_/cdn/cloudflare-static/_/js/
HTTP POST URI/cdn/u/0/
Max GET Size1049376
Port2083
post-ex.spawnto_x64%windir%\sysnative\rundll32[.]exe
post-ex.spawnto_x86%windir%\syswow64\rundll32[.]exe
process-inject.startrwx64
process-inject.userwx64
process-inject.allocatorN/A
proxy.behavior2 (Use IE settings)
sleeptime60000
useragent_headerMozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727)
uses_cookies1
process-inject.executeCreateThread, SetThreadContext, CreateRemoteThread, RtlCreateUserThread
WatermarkN/A
Beacon Stage CleanupN/A