Post

Cobalt Strike Operators Leverage PowerShell Loaders Across Chinese, Russian, and Global Infrastructure

Cobalt Strike Operators Leverage PowerShell Loaders Across Chinese, Russian, and Global Infrastructure

Key Takeaways

  • The PowerShell script (y1.ps1) executes shellcode directly in memory using reflective techniques.
  • It connects to a second-stage C2 server hosted on Baidu Cloud Function Compute.
  • The shellcode employs API hashing and sets forged User-Agent strings to evade detection.
  • The final payload communicates with a known Cobalt Strike IP address in Russia.
  • SSL metadata and loader behavior confirm links to Cobalt Strike post-exploitation tools.

To read the complete article see: Hunt.IO

This post is licensed under CC BY 4.0 by the author.