Cobalt Stike Beacon Detected – 45[.]142[.]212[.]47:443

Cobalt Strike Beacon Detection Alerts

The Information provided at the time of posting was detected as “Cobalt Strike”. Depending on when you are viewing this article, it may no longer be the case and could be determined as being a false positive. Please do your own additional validation. – RedPacket Security

TimeStamp 2021-11-18T11:00:19.611587

Cobalt Strike
Cobalt Strike

General Information

1199549244
Cloud Provider
Cloud Region
Service
Domainspq[.]hosting
Hostnamesvm281674[.]pq[.]hosting
HTTP Host45[.]142[.]212[.]47
ISPPQ HOSTING S.R.L.
ORGPQ HOSTING S.R.L.
OSN/A
HTTPN/A
HTTP HTML HASHN/A
HTTP LOCATION/
HTTP REDIRECTS
HTTP ROBOTSN/A
HTTP ROBOTS HASHN/A
HTTP SECURITY.TXTN/A
HTTP SECURITY.TXT HASHN/A
HTTP SERVERNode.js
HTTP SITEMAPN/A
HTTP SITEMAP HASHN/A
HTTP TITLEN/A
LOCATION (AREA CODE)N/A
LOCATION (CITY)Chisinau
LOCATION (COUNTRY CODE)MD
LOCATION (COUNTRY NAME)Moldova, Republic of
LOCATION (LATITUDE)47.00556
LOCATION (LONGITUDE)28.8575
LOCATION (POSTAL CODE)N/A
SSL SERIAL
SSL EXPIREDN/A
SSL FINGERPRINT (SHA1)a78c65178ea6c8f62938f3488d3ab00dc9954a28
SSL ISSUED20211117142940Z
SSL EXPIRES20221117142940Z
SSL CYPHERECDHE-RSA-AES256-GCM-SHA384
SSL VERSIONTLSv1/SSLv3
SSL TRUST (REVOKED)N/A
TAGSself-signed


Cobalt Strike Beacon Information

Beacon TypeHTTPS
http-get.clientAccept: application/xhtml+xml, application/json, text/html, Accept-Language: es-pe, Accept-Encoding: br, *, affiliate_id_5CD2E0JUQGFA4XHZ=, Cookie
http-post.clientAccept: application/json, application/xhtml+xml, image/*, Accept-Language: sb, Accept-Encoding: identity, br, _KEHMGHVV
DNS Beacon MaxDNSN/A
DNS Beacon IdleN/A
Beacon Jitter34
dns-beacon.strategy_fail_seconds-1
dns-beacon.strategy_rotate_seconds-1
dns-beacon.strategy_fail_x-1
HTTP GET URI45[.]142[.]212[.]47,/Remove/whitepapers/JMVV8JQ7
HTTP POST URI/Generate/classic/3OC2GC16H
Max GET Size2098980
Port443
post-ex.spawnto_x64%windir%\sysnative\svchost[.]exe
post-ex.spawnto_x86%windir%\syswow64\svchost[.]exe -k netsvc
process-inject.startrwx4
process-inject.userwx32
process-inject.allocatorN/A
proxy.behavior2 (Use IE settings)
sleeptime1000
useragent_headerMozilla/5.0 (Windows NT 6.1; rv:53.0) Gecko/20100101 Firefox/53.0
uses_cookies1
process-inject.executentdll:RtlUserThreadStart, CreateThread, NtQueueApcThread-s, CreateRemoteThread, RtlCreateUserThread
Watermark1234567890
Beacon Stage Cleanup1