Practical queries for identifying malware infrastructure with FOFA.
https://en.fofa.info/
AsyncRAT
Hardcoded Certificate Values
cert.subject.cn="AsyncRAT Server" || cert.issuer.cn="AsyncRAT Server" - Link
Cobalt Strike
Default Certificate Values
cert.issuer.cn="Major Cobalt Strike" - Link
cert.issuer.org="cobaltstrike" - Link
Amadey Bot
Re-used certificate values
cert.subject.cn="desas.digital" - Link
Quasar RAT
Default certificate values.
cert.subject.cn="Quasar Server CA" - Link
Laplas Clipper
Certificate values and favicon hash.
cert.subject.cn="Laplas.app" - Link
icon_hash="1123908622" - Link
Sliver C2
Default Certificate values
cert.subject.cn="multiplayer" && cert.issuer.cn="operators" - Link
Mythic C2
Default favicon hash and html title
icon_hash="-859291042" - Link
title=="Mythic" - Link
Supershell Botnet
HTML titles and re-used favicon
icon_hash="-1010228102" - Link
title="Supershell" - Link