Cobalt Stike Beacon Detected – 49[.]233[.]115[.]153:443

Cobalt Strike Beacon Detection Alerts

The Information provided at the time of posting was detected as “Cobalt Strike”. Depending on when you are viewing this article, it may no longer be the case and could be determined as being a false positive. Please do your own additional validation. – RedPacket Security

TimeStamp 2021-11-15T22:43:41.767370

Cobalt Strike
Cobalt Strike

General Information

5.4997816643357266e+47
Cloud ProviderTencent Cloud
Cloud RegionN/A
ServiceN/A
DomainsN/A
HostnamesN/A
HTTP Host49[.]233[.]115[.]153
ISPShenzhen Tencent Computer Systems Company Limited
ORGTencent cloud computing (Beijing) Co., Ltd.
OSN/A
HTTPN/A
HTTP HTML HASHN/A
HTTP LOCATION/
HTTP REDIRECTS
HTTP ROBOTSN/A
HTTP ROBOTS HASHN/A
HTTP SECURITY.TXTN/A
HTTP SECURITY.TXT HASHN/A
HTTP SERVERN/A
HTTP SITEMAPN/A
HTTP SITEMAP HASHN/A
HTTP TITLEN/A
LOCATION (AREA CODE)N/A
LOCATION (CITY)Beijing
LOCATION (COUNTRY CODE)CN
LOCATION (COUNTRY NAME)China
LOCATION (LATITUDE)39.9075
LOCATION (LONGITUDE)116.39723
LOCATION (POSTAL CODE)N/A
SSL SERIAL
SSL EXPIREDN/A
SSL FINGERPRINT (SHA1)3e73cee499a52bd9dd69fa612fe4b50f459b16d4
SSL ISSUED20211015090100Z
SSL EXPIRES20361011090100Z
SSL CYPHERECDHE-RSA-AES256-GCM-SHA384
SSL VERSIONTLSv1/SSLv3
SSL TRUST (REVOKED)N/A
TAGScloud


Cobalt Strike Beacon Information

Beacon TypeHTTPS
http-get.clientHost: mail[.]chinatelecom-hr[.]com, Accept: text/html,application/xhtml+xml,application/xml;q=0[.]9,*/*l;q=0[.]8, Pragma: no-cache, [.]cab
http-post.clientAccept: */*, Host: mail[.]chinatelecom-hr[.]com, Pragma: no-cache, [.]cab
DNS Beacon MaxDNSN/A
DNS Beacon IdleN/A
Beacon Jitter10
dns-beacon.strategy_fail_seconds-1
dns-beacon.strategy_rotate_seconds-1
dns-beacon.strategy_fail_x-1
HTTP GET URI49[.]233[.]115[.]153,/c/msdownload/update/others/2021/10/29136388_
HTTP POST URI/c/msdownload/update/others/2021/10/3215234_
Max GET Size1398102
Port443
post-ex.spawnto_x64%windir%\sysnative\wusa[.]exe
post-ex.spawnto_x86%windir%\syswow64\wusa[.]exe
process-inject.startrwx64
process-inject.userwx64
process-inject.allocatorN/A
proxy.behavior2 (Use IE settings)
sleeptime60000
useragent_headerWindows-Update-Agent/10.0.10011.16384 Client-Protocol/2.31
uses_cookiesN/A
process-inject.executeCreateThread, SetThreadContext, CreateRemoteThread, RtlCreateUserThread
Watermark426352781
Beacon Stage CleanupN/A