Practical queries for identifying malware infrastructure with FOFA.

https://en.fofa.info/

AsyncRAT

Hardcoded Certificate Values

cert.subject.cn="AsyncRAT Server" || cert.issuer.cn="AsyncRAT Server" - Link

Cobalt Strike

Default Certificate Values

cert.issuer.cn="Major Cobalt Strike" - Link

cert.issuer.org="cobaltstrike" - Link

Amadey Bot

Re-used certificate values

cert.subject.cn="desas.digital" - Link

Quasar RAT

Default certificate values.

cert.subject.cn="Quasar Server CA" - Link

Laplas Clipper

Certificate values and favicon hash.

cert.subject.cn="Laplas.app" - Link

icon_hash="1123908622" - Link

Sliver C2

Default Certificate values

cert.subject.cn="multiplayer" && cert.issuer.cn="operators" - Link

Mythic C2

Default favicon hash and html title

icon_hash="-859291042" - Link

title=="Mythic" - Link

Supershell Botnet

HTML titles and re-used favicon

icon_hash="-1010228102" - Link

title="Supershell" - Link

The link has been copied!