analysis of cobalt strike network traffic obfuscation in
play

Analysis of Cobalt Strike network traffic obfuscation in C2 - PowerPoint PPT Presentation

Analysis of Cobalt Strike network traffic obfuscation in C2 communication Vincent van der Eijk & Coen Schuijt University of Amsterdam vincent.vandereijk@os3.nl, coen.schuijt@os3.nl July 3, 2020 Vincent van der Eijk & Coen Schuijt (OS3)


  1. Analysis of Cobalt Strike network traffic obfuscation in C2 communication Vincent van der Eijk & Coen Schuijt University of Amsterdam vincent.vandereijk@os3.nl, coen.schuijt@os3.nl July 3, 2020 Vincent van der Eijk & Coen Schuijt (OS3) C2 network analysis July 3, 2020 1 / 25

  2. Introduction Red and Blue Teaming RAT → Botnet Cobalt Strike APTs Figure 1: Cobalt strike logo [https://cobaltstrike.com/] Vincent van der Eijk & Coen Schuijt (OS3) C2 network analysis July 3, 2020 2 / 25

  3. Research questions Main research question ”How can we distinguish obfuscated Cobalt Strike beacons from genuine traffic based on identifying features?” Sub questions Which features can we extract from network traffic generated by 1 malleable C2 profiles? Can we detect a Cobalt Strike beacon using a malleable profile with 2 one or more of those features? Vincent van der Eijk & Coen Schuijt (OS3) C2 network analysis July 3, 2020 3 / 25

  4. State of the art (I/II) 1 2 3 4 Target CDN Redirector C2 Figure 2: Common C2 network setup Beacon Domain redirection Redirector/proxy C2 Server Vincent van der Eijk & Coen Schuijt (OS3) C2 network analysis July 3, 2020 4 / 25

  5. State of the art (II/II) Malleable Profile Defines beaconing behaviour HTTP parameters Encoding Highly customizable 1 set sleeptime "5000"; 2 set jitter "0"; 3 set useragent "Mozilla /5.0 (Windows NT 6.1; WOW64; Trident /7.0; rv :11.0) like Gecko "; 4 5 http -get { 6 set uri "/s/ref=nb_sb_noss_1 /167 -3294888 -0262949/ field - 7 keywords=books "; Listing 1: Snippet from the amazon.profile Vincent van der Eijk & Coen Schuijt (OS3) C2 network analysis July 3, 2020 5 / 25

  6. Related work Little scientific research on Cobalt Strike No research specific to malleable profiles Botnet traffic detection researched thoroughly Sources L. van Duijn (2014) Beacon detection in PCAP files J. Dreijer (2015) StealthWare - Social Engineering Malware Vincent van der Eijk & Coen Schuijt (OS3) C2 network analysis July 3, 2020 6 / 25

  7. Methodology 1 2 3 4 5 Network Topology Data capturing Dataset generation Feature engineering Testing Configure ncapd Benign: browse Test feature on Setup Target Machine Parse dataset listener amazon dataset Malicious: capture Configure domain Configure softflow HTTP(S) beacon Group dataset Plot results redirection deamon traffic Install packet capture Mixed: HTTP(S) Setup redirector Filter dataset software beacon & tcpreplay Mixed: HTTP(S) Create identifying Configure C2 Server beacon & office use feature simulation Mixed: HTTP(S) beacon & office use simulation Figure 3: Project approach Vincent van der Eijk & Coen Schuijt (OS3) C2 network analysis July 3, 2020 7 / 25

  8. Infrastructure setup (I/II) 1 2 3 4 Target CDN Redirector C2 Figure 4: Infrastructure setup 1 Target Windows 10 (1909) NAT interface 2 CDN Amazon CloudFront Domain redirection (Host Header, Redirector IP) Vincent van der Eijk & Coen Schuijt (OS3) C2 network analysis July 3, 2020 8 / 25

  9. Infrastructure setup (II/II) 1 2 3 4 Target CDN Redirector C2 Figure 4: Infrastructure setup 3 Redirector socat proxy 443, 80 4 C2 Server Cobalt Strike 4.0 amazon.profile Vincent van der Eijk & Coen Schuijt (OS3) C2 network analysis July 3, 2020 9 / 25

  10. Data gathering (I/V) Benign PCAPS for HTTP Malicious NetFlow for HTTPS Mixed Active beacon Simulate user browsing updating mailing ... Reproduceable dataset External CTU-13 (Botnet-43) 1 6M flows, university network Stratosphere Research Laboratory (CZ) 1 https://mcfp.felk.cvut.cz/publicDatasets/CTU-Malware-Capture-Botnet-43/ Vincent van der Eijk & Coen Schuijt (OS3) C2 network analysis July 3, 2020 10 / 25

  11. Detection algorithm (I/II) 1 1 Start Read NetFlow data Reached EOF Yes 1 Read NetFlow data No 2 Creating host objects 3 Yes Host Attach flow to host known 3 Append flow to host (src IP) No 2 Create new host object Figure 5: Detection algorithm pt.1 Vincent van der Eijk & Coen Schuijt (OS3) C2 network analysis July 3, 2020 11 / 25

  12. Detection algorithm (II/II) 4 Filter Flows config.cfg 5 Apply Features 4 Filter flows 5 Apply feature (Host) 6 Yes 6 Alert Exceeds Alert Threshold No Figure 6: Detection algorithm pt.2 Vincent van der Eijk & Coen Schuijt (OS3) C2 network analysis July 3, 2020 12 / 25

  13. Results Amazon.profile traffic analysis (Cobalt Strike) HTTP Beacon Benign Amazon network traffic HTTPS Beacon Beacon detection algorithm Detection accuracy Vincent van der Eijk & Coen Schuijt (OS3) C2 network analysis July 3, 2020 13 / 25

  14. Amazon profile traffic analysis: HTTP Beacon (I/V) Figure 7: Packet capture for HTTP beacon Vincent van der Eijk & Coen Schuijt (OS3) C2 network analysis July 3, 2020 14 / 25

  15. Amazon profile traffic analysis: Benign (II/V) Figure 8: Packet capture for benign Amazon traffic Vincent van der Eijk & Coen Schuijt (OS3) C2 network analysis July 3, 2020 15 / 25

  16. Amazon traffic analysis: HTTPS Beacon (III/V) Figure 9: Packet capture for Amazon HTTPS beacon Vincent van der Eijk & Coen Schuijt (OS3) C2 network analysis July 3, 2020 16 / 25

  17. Amazon traffic analysis: HTTPS Beacon (IV/V) Figure 10: NetFlow data for HTTPS beacon Vincent van der Eijk & Coen Schuijt (OS3) C2 network analysis July 3, 2020 17 / 25

  18. Amazon traffic analysis: Summary (V/V) We identified the following features: Periodicity Consistent byte size of flows Short flow duration TCP Flags Lack of DNS requests Vincent van der Eijk & Coen Schuijt (OS3) C2 network analysis July 3, 2020 18 / 25

  19. Beacon detection Figure 11: Linear regression for regular Figure 12: Linear regression for C2 server HTTPS network traffic shows a weak network traffic shows a high correlation correlation (r=0.854) (r=0.999) Vincent van der Eijk & Coen Schuijt (OS3) C2 network analysis July 3, 2020 19 / 25

  20. Results: Accuracy Table 1: Overview of NetFlow streams that the detection algorithm was able to classify correctly as either benign (good) or malicious (bad) Actual Good Bad Good 128910 2 Predicted Bad 5 15 TP + TN 13 + 128267 ACC = TP + TN + FP + FN = 13 + 128267 + 5 + 2 = 99 , 996% Vincent van der Eijk & Coen Schuijt (OS3) C2 network analysis July 3, 2020 20 / 25

  21. Discussion Difficult to obtain a large dataset with benign network traffic Only tested on our own malware samples and infrastructure Vincent van der Eijk & Coen Schuijt (OS3) C2 network analysis July 3, 2020 21 / 25

  22. Conclusions I/II Q1: Which features can we extract from network traffic generated by malleable C2 profiles? Time interval Byte size of flow Flow duration TCP flags DNS requests Q2: Can we detect a Cobalt Strike beacon using a malleable profile with one or more of those features? All features except the correlation to DNS requests and the TCP RST flag are useable Vincent van der Eijk & Coen Schuijt (OS3) C2 network analysis July 3, 2020 22 / 25

  23. Conclusions II/II How can we distinguish obfuscated Cobalt Strike beacons from genuine traffic based on identifying features? Filter rules based on identified features Detection algorithm using linear regression Vincent van der Eijk & Coen Schuijt (OS3) C2 network analysis July 3, 2020 23 / 25

  24. Future Work Further research the TCP RST flag behaviour Expand the detection algorithm to fingerprint threat actors Modify the detection algorithm to support real-time detection Vincent van der Eijk & Coen Schuijt (OS3) C2 network analysis July 3, 2020 24 / 25

  25. Key findings C2 communication of Cobalt Strike shows periodicity We are able to detect other profiles than the Amazon profile Avoid detection by changing the beaconing interval regularly Vincent van der Eijk & Coen Schuijt (OS3) C2 network analysis July 3, 2020 25 / 25

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend