Cobalt Strike Beacon Detected – 45[.]91[.]81[.]246:80
Cobalt Strike Beacon Detection Alerts
The Information provided at the time of posting was detected as “Cobalt Strike”. Depending on when you are viewing this article, it may no longer be the case and could be determined as being a false positive. Please do your own additional validation. – RedPacket Security
TimeStamp 2024-10-15T18:43:03.247159
General Information
Cloud Provider | |
Cloud Region | |
Service | |
Domains | N/A |
Hostnames | N/A |
HTTP Host | 45[.]91[.]81[.]246 |
ISP | FASTNET DATA INC |
ORG | RHINO CLOUD LTD |
OS | N/A |
HTTP | N/A |
HTTP HTML HASH | N/A |
HTTP LOCATION | / |
HTTP REDIRECTS | |
HTTP ROBOTS | N/A |
HTTP ROBOTS HASH | N/A |
HTTP SECURITY.TXT | N/A |
HTTP SECURITY.TXT HASH | N/A |
HTTP SERVER | Apache |
HTTP SITEMAP | N/A |
HTTP SITEMAP HASH | N/A |
HTTP TITLE | N/A |
LOCATION (AREA CODE) | N/A |
LOCATION (CITY) | Los Angeles |
LOCATION (COUNTRY CODE) | US |
LOCATION (COUNTRY NAME) | United States |
LOCATION (LATITUDE) | 34.05223 |
LOCATION (LONGITUDE) | -118.24368 |
LOCATION (POSTAL CODE) | N/A |
SSL SERIAL | |
SSL EXPIRED | |
SSL FINGERPRINT (SHA1) | |
SSL ISSUED | |
SSL EXPIRES | |
SSL CYPHER | |
SSL VERSION | |
SSL TRUST (REVOKED) | |
TAGS |
Cobalt Strike Beacon Information
Beacon Type | N/A |
http-get.client | Accept: text/html,application/xhtml+xml,application/xml;q=0[.]9,*/*;q=0[.]8, Referer: http://hh[.]ltsc[.]name/, Accept-Encoding: gzip, deflate, __cfduid=, Cookie |
http-post.client | Accept: text/html,application/xhtml+xml,application/xml;q=0[.]9,*/*;q=0[.]8, Referer: http://hh[.]ltsc[.]name/, Accept-Encoding: gzip, deflate, __cfduid |
DNS Beacon MaxDNS | N/A |
DNS Beacon Idle | N/A |
Beacon Jitter | N/A |
dns-beacon.strategy_fail_seconds | N/A |
dns-beacon.strategy_rotate_seconds | N/A |
dns-beacon.strategy_fail_x | N/A |
HTTP GET URI | hh[.]ltsc[.]name,/jquery-3[.]3[.]1[.]min[.]js |
HTTP POST URI | N/A |
Max GET Size | N/A |
Port | N/A |
post-ex.spawnto_x64 | %windir%\sysnative\dllhost[.]exe |
post-ex.spawnto_x86 | %windir%\syswow64\dllhost[.]exe |
process-inject.startrwx | N/A |
process-inject.userwx | N/A |
process-inject.allocator | N/A |
proxy.behavior | N/A |
sleeptime | N/A |
useragent_header | N/A |
uses_cookies | N/A |
process-inject.execute | ntdll:RtlUserThreadStart, CreateThread, NtQueueApcThread-s, CreateRemoteThread, RtlCreateUserThread |
Watermark | N/A |
Beacon Stage Cleanup | N/A |
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.