5 min read

Malleable C2 Profiles and You

Understanding Cobalt Strike's Malleable C2 profiles - how attackers customize traffic and how defenders can detect it.

cobalt-strike c2 malleable detection red-team

Originally published on Medium
Read the full article: Malleable C2 Profiles and You

What are Malleable C2 Profiles?

Malleable C2 lets Cobalt Strike operators customize:

  • HTTP headers
  • URI patterns
  • Data encoding
  • Traffic timing
  • SSL/TLS certificates

This makes C2 traffic blend with legitimate traffic.

Profile Anatomy

http-get {
    set uri "/api/v1/users";
    
    client {
        header "Accept" "application/json";
        metadata {
            base64url;
            header "Authorization";
        }
    }
    
    server {
        header "Content-Type" "application/json";
        output {
            base64;
            print;
        }
    }
}

Common Masquerades

Profiles often impersonate:

  • Cloud services (AWS, Azure, GCP)
  • CDNs (Cloudflare, Akamai)
  • Legitimate APIs
  • Popular websites

Detection Strategies

JA3/JA3S Fingerprinting

TLS fingerprints can identify Cobalt Strike even with custom profiles.

Behavioral Analysis

  • Beacon timing patterns
  • Metadata size consistency
  • Response/request ratios

Known Profile Indicators

index=proxy 
| where match(uri, "/api/v1/users|/cloud/sync|/update/check")
| stats count by src_ip, uri, user_agent

Certificate Analysis

Self-signed or suspicious certificates.

Defense Recommendations

  • Deploy JA3 fingerprinting
  • Monitor for beacon timing
  • Analyze HTTP anomalies
  • Use threat intel for known profiles

Read the full analysis: Malleable C2 Profiles and You

Related Modules

Active

Atomics on a Friday

Weekly YouTube show exploring atomic tests, detection engineering, and security research. Live demonstrations and deep dives into attack techniques.

youtube atomic-red-team detection education +1
Active

Bootloaders.io

A curated list of known malicious bootloaders for various operating systems. Track and catalog bootloader threats with detection rules and hash prevention.

bootloader bootkit detection defense +1