Explore >> Select a destination


You are here

0xcybery.github.io
| | forensicitguy.github.io
1.1 parsecs away

Travel
| | In this post I want to take a look at a PowerShell-based Cobalt Strike beacon that appeared on MalwareBazaar. This particular beacon is representative of most PowerShell Cobalt Strike activity I see in the wild during my day job. The beacons often show up as service persistence during incidents or during other post-exploitation activity. If you want to follow along at home, the sample I'm using is here:
| | cocomelonc.github.io
1.2 parsecs away

Travel
| |
| | cocomelonc.github.io
1.7 parsecs away

Travel
| |
| | modexp.wordpress.com
22.5 parsecs away

Travel
| Introduction Quick post about Windows System calls that I forgot about working on after the release of Dumpert by Cn33liz last year, which is described in this post. Typically, EDR and AV set hooks on Win32 API or NT wrapper functions to detect and mitigate against malicious activity. Dumpert attempts to bypass any user-level hooks...