Brad posted another malware analysis with capture file of Cobalt Strike traffic. The traffic is encrypted and the key is unknown. While it's impossible to determine what exact commands were executed in this case, it is still possible to determine if commands were send by the C2 and if results were sent back. I explain how in this video. If you have proxy logs in stead of a packet capture, it's possible to do the same analysis, provided that the proxy logs report how much data (size of HTTP headers and size of data) was exchanged. Didier Stevens |
DidierStevens 639 Posts ISC Handler May 23rd 2021 |
Thread locked Subscribe |
May 23rd 2021 1 year ago |
Sign Up for Free or Log In to start participating in the conversation!