Effective Queries for Detecting Malware Infrastructure Using FOFA

Practical queries for identifying malware infrastructure with FOFA.

https://en.fofa.info

AsyncRAT

Hardcoded Certificate Values

cert.subject.cn="AsyncRAT Server" || cert.issuer.cn="AsyncRAT Server" – Link

Cobalt Strike

Default Certificate Values

cert.issuer.cn="Major Cobalt Strike" – Link

cert.issuer.org="cobaltstrike" – Link

Amadey Bot

Re-used certificate values

cert.subject.cn="desas.digital" – Link

Quasar RAT

Default certificate values.

cert.subject.cn="Quasar Server CA" – Link

Laplas Clipper

Certificate values and favicon hash.

cert.subject.cn="Laplas.app" – Link

icon_hash="1123908622" – Link

Sliver C2

Default Certificate values

cert.subject.cn="multiplayer" && cert.issuer.cn="operators" – Link

Mythic C2

Default favicon hash and html title

icon_hash="-859291042" – Link

title=="Mythic" – Link

Supershell Botnet

HTML titles and re-used favicon

icon_hash="-1010228102" – Link

title="Supershell" – Link