HomeCyber BalkansCobalt Strike 4.11 now includes Built-In Evasion Features for Red Teams

Cobalt Strike 4.11 now includes Built-In Evasion Features for Red Teams

Published on

spot_img

The release of Cobalt Strike version 4.11 marks a significant milestone in the realm of offensive security operations. This latest update is packed with a robust suite of features that cater to enhancing evasion capabilities for red teams, solidifying Cobalt Strike’s position as a leading platform for threat emulation.

One of the key highlights of Cobalt Strike 4.11 is the enhanced evasion options it offers. The introduction of the novel Sleepmask feature, automatically enabled via Malleable C2, adds a layer of obfuscation to Beacon, its heap allocations, and itself. This new Sleepmask makes the tool more robust against static signatures without requiring additional configuration, seamlessly integrating with Beacon to enhance runtime masking.

Another notable addition is the novel process injection technique, “ObfSetThreadContext,” which sets the injected thread start address as the legitimate remote image entry point. This technique bypasses typical thread injection detection methods by ensuring that injected threads appear as if they originate from legitimate executable images. Users can configure this technique by specifying a module and function offset for the thread start address in the configuration file.

In addition to enhanced evasion capabilities, Cobalt Strike has overhauled Beacon’s reflective loader, shifting to a prepend/sRDI style loader. This overhaul includes features like EAF Bypass, support for indirect syscalls, and obfuscation routines that allow the application of complex obfuscation routines to Beacon payloads.

A significant addition to the latest release is the introduction of Asynchronous Beacon Object Files (BOFs) through async-execute.dll. This feature allows the execution of BOFs in new threads without blocking Beacon, supporting both single-shot and background execution modes. Operators can now run multiple BOFs simultaneously within the same process, each executing as its own job with output viewable in the Cobalt Strike GUI.

Furthermore, the release includes a DNS over HTTPS Beacon, providing users with a stealthy network egress option. This feature allows users to easily configure DoH settings via Malleable C2, enhancing the flexibility and stealthiness of network communications.

Cobalt Strike 4.11 also includes quality-of-life updates such as enhanced command line variables, a reorganized Beacon help command, improved host rotation capabilities, and data exfiltration prevention features. These updates not only improve the overall user experience but also provide a more robust framework for customizing tradecraft within the Cobalt Strike ecosystem.

Overall, Cobalt Strike 4.11 represents a significant leap forward in the world of threat emulation, empowering red teams with advanced evasion capabilities and enhanced operational flexibility. The integrated features not only enhance stealth operations but also provide a solid foundation for customization within the Cobalt Strike ecosystem, showcasing the commitment of developers to continuously innovate and support sophisticated offensive security operations.

Source link

Latest articles

Researcher demonstrates the ability of GenAI tools to create Chrome infostealers

A groundbreaking technique to utilize popular large language models (LLMs) for coding information-stealing malware...

Microsoft Issues Warning About ‘StilachiRAT’ Multifunctional Software

A new form of malware has been identified by cybersecurity experts, and it is...

DOGE Employee Shared Unencrypted Personal Information

A recent incident involving a staff member from the Department of Government Efficiency (DOGE)...

Lazarus Group Targets Bybit, Steals $1.5 Billion

The cryptocurrency world was thrown into chaos on Monday morning when news broke of...

More like this

Researcher demonstrates the ability of GenAI tools to create Chrome infostealers

A groundbreaking technique to utilize popular large language models (LLMs) for coding information-stealing malware...

Microsoft Issues Warning About ‘StilachiRAT’ Multifunctional Software

A new form of malware has been identified by cybersecurity experts, and it is...

DOGE Employee Shared Unencrypted Personal Information

A recent incident involving a staff member from the Department of Government Efficiency (DOGE)...