CobaltStrike Malleable Amazon Browsing Traffic Profile
Detects Malleable Amazon Profile
Sigma rule (View on GitHub)
1title: CobaltStrike Malleable Amazon Browsing Traffic Profile
2id: 953b895e-5cc9-454b-b183-7f3db555452e
3status: test
4description: Detects Malleable Amazon Profile
5references:
6 - https://github.com/rsmudge/Malleable-C2-Profiles/blob/26323784672913923d20c5a638c6ca79459e8529/normal/amazon.profile
7 - https://www.hybrid-analysis.com/sample/ee5eca8648e45e2fea9dac0d920ef1a1792d8690c41ee7f20343de1927cc88b9?environmentId=100
8author: Markus Neis
9date: 2019/11/12
10modified: 2022/07/07
11tags:
12 - attack.defense_evasion
13 - attack.command_and_control
14 - attack.t1071.001
15logsource:
16 category: proxy
17detection:
18 selection_1:
19 c-useragent: 'Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko'
20 cs-method: 'GET'
21 c-uri: '/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books'
22 cs-host: 'www.amazon.com'
23 cs-cookie|endswith: '=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996'
24 selection_2:
25 c-useragent: 'Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko'
26 cs-method: 'POST'
27 c-uri: '/N4215/adj/amzn.us.sr.aps'
28 cs-host: 'www.amazon.com'
29 condition: 1 of selection_*
30falsepositives:
31 - Unknown
32level: high
References
Related rules
- Empire UserAgent URI Combo
- Bitsadmin to Uncommon IP Server Address
- Telegram API Access
- Bitsadmin to Uncommon TLD
- CobaltStrike Malformed UAs in Malleable Profiles