Practical queries for identifying malware infrastructure with FOFA.
AsyncRAT
Hardcoded Certificate Values
cert.subject.cn="AsyncRAT Server" || cert.issuer.cn="AsyncRAT Server" – Link
Cobalt Strike
Default Certificate Values
cert.issuer.cn="Major Cobalt Strike" – Link
cert.issuer.org="cobaltstrike" – Link
Amadey Bot
Re-used certificate values
cert.subject.cn="desas.digital" – Link
Quasar RAT
Default certificate values.
cert.subject.cn="Quasar Server CA" – Link
Laplas Clipper
Certificate values and favicon hash.
cert.subject.cn="Laplas.app" – Link
icon_hash="1123908622" – Link
Sliver C2
Default Certificate values
cert.subject.cn="multiplayer" && cert.issuer.cn="operators" – Link
Mythic C2
Default favicon hash and html title
icon_hash="-859291042" – Link
title=="Mythic" – Link
Supershell Botnet
HTML titles and re-used favicon
icon_hash="-1010228102" – Link
title="Supershell" – Link

