添加链接
link管理
链接快照平台
  • 输入网页链接,自动生成快照
  • 标签化管理网页链接
  • The Leaked LockBit 3 builder was used to create a LockBit payload with a custom ransom note that included reference to a Telegram group which we investigated further in the report.
  • An audio version of this report can be found on Spotify , Apple , YouTube , Audible , & Amazon .

    The DFIR Report Services

    Reports such as this one are part of our All Intel service and are categorized as Threat Actor Insights.

  • DFIR Labs : Offers cloud-based, hands-on learning experiences, using real data, from real intrusions. Interactive labs are available with different difficulty levels and can be accessed on-demand, accommodating various learning speeds.
  • Table of Contents:

  • Case Summary
  • Services
  • Analysts
  • Capability
  • Victims
  • Infrastructure
  • Adversary
  • Diamond Model
  • Indicators
  • MITRE ATT&CK
  • Case Summary

    The DFIR Report’s Threat Intel Team detected an open directory in January 2024 and analyzed it for trade craft and threat actor activity. Once reviewed, we identified it was related to the Chinese speaking hacking group that call themselves “You Dun”.

    The threat actor conducted various activities using the host we investigated which included reconnaissance and web exploitation activities. Using tools such as WebLogicScan, Vulmap, and Xray, they were able to identify numerous vulnerable servers. They exploited several websites running Zhiyuan OA software and used SQLmap to conduct SQL injection.

    We found evidence of several successful exploitation attempts. After gaining access we found use of further tools to try and use various exploits to elevate privileges on the compromised hosts, including the use of traitor for Linux privilege escalation exploits and CDK for docker and kubernetes privilege escalation.

    Both Cobalt Strike and Viper framework files were visible in the open directory. A zip archive that contained the files for a Cobalt Strike team server, included the plugins TaoWu and Ladon which extend the capabilities of the framework greatly. The DFIR Report Threat Intel Team tracked the server as hosting active command and control from January 18th through Feburary 10th of 2024. Using data from the leaked server we identified a cluster of eight IP address’s all being used to proxy the command and control for the same threat actor and active for the same time frame.

    The threat actor also utilized the leaked LockBit 3 ransomware builder to create a custom binary LB3.exe. The ransom note the LockBit binary produced provided the contact details as a Telegram group “You_Dun” administrated by “EVA”. The group responsible also use the name “Dark Cloud Shield Technical Team”. This group appears to be involved in selling “penetration testing” according to their channels, but also engaged in illicit data sales, DDOS, and based on the LockBit binary, also use ransomware to earn a payday.

    If you would like to get an email when we publish a new report, please subscribe here .

    Analysts

    Analysis and reporting completed by @pcsc0ut and @svch0st .

    Capability

    Reconnaissance

    WebLogicScan

    The threat actor use WebLogicScan , a python script that scans for vulnerabilities in WebLogic.

    Based on bash history, they ran the tool by supplying various text files to the script.

    dns-beacon.strategy_fail_seconds: -1 dns-beacon.strategy_fail_x: -1 dns-beacon.strategy_rotate_seconds: -1 http-get.client: Cookie http-get.uri: 116.212.120.32,/IE9CompatViewList.xml http-get.verb: GET http-post.client: Content-Type: application/octet-stream http-post.uri: /submit.php http-post.verb: POST maxgetsize: 1048576 port: 80 post-ex.spawnto_x64: %windir%\sysnative\rundll32.exe post-ex.spawnto_x86: %windir%\syswow64\rundll32.exe process-inject.execute: CreateThread SetThreadContext CreateRemoteThread RtlCreateUserThread process-inject.startrwx: 64 process-inject.stub: e43a1b63f09794f74d90a9889f7acb77 process-inject.userwx: 64 proxy.behavior: 2 (Use IE settings) server.publickey_md5: a490a5e2db1fcc496e6b793a8ea02a19 sleeptime: 60000 useragent_header: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; BOIE9;ENUS) uses_cookies: 1 watermark: 987654321 beacon_type: HTTP dns-beacon.strategy_fail_seconds: -1 dns-beacon.strategy_fail_x: -1 dns-beacon.strategy_rotate_seconds: -1 http-get.client: Cookie http-get.uri: 116.212.120.32,/visit.js http-get.verb: GET http-post.client: Content-Type: application/octet-stream http-post.uri: /submit.php http-post.verb: POST maxgetsize: 1048576 port: 80 post-ex.spawnto_x64: %windir%\sysnative\rundll32.exe post-ex.spawnto_x86: %windir%\syswow64\rundll32.exe process-inject.execute: CreateThread SetThreadContext CreateRemoteThread RtlCreateUserThread process-inject.startrwx: 64 process-inject.stub: e43a1b63f09794f74d90a9889f7acb77 process-inject.userwx: 64 proxy.behavior: 2 (Use IE settings) server.publickey_md5: a490a5e2db1fcc496e6b793a8ea02a19 sleeptime: 60000 useragent_header: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) uses_cookies: 1 watermark: 987654321

    Due to the location of the payload being written to disk matching POC exploit code ( https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-25003.yaml ) , we assess with high confidence that initial access was gained through a WordPress plugin WPCargo exploit, specifically, the Remote Code execution vulnerability CVE-2021-25003.

    Privilege Escalation

    The reverse shell created by the payload appeared to be used to run a docker container exploit using a tool called CDK .

    Server: SimpleHTTP/0.6 Python/3.8.10 28888/mitmproxy SSL Cert Issuer: CN=mitmproxy, O=mitmproxy SSL Cert Subject: CN=163.53.216.157 JA3S: 15af977ce25de452b96affa2addb1036 55918/SSH Fingerprint SHA256: 1192d660e36e9b6f671a22a1ed1adb50f752ca986885ecfffdbbf3967e8ff9c1 SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.11 60000/Viper SSL Cert Issuer: C=CN, ST=0d72da0c, L=0d72da0c, O=0d72da0c, OU=0d72da0c, CN=0d72da0c SSL Cert Subject: C=CN, ST=d1d38ec9, L=d1d38ec9, O=d1d38ec9, OU=d1d38ec9, CN=d1d38ec9 JA3S: 475c9302dc42b2751db9edcac3b74891
    SSH Fingerprint for OpenDir 
    SHA256: 1192d660e36e9b6f671a22a1ed1adb50f752ca986885ecfffdbbf3967e8ff9c1
    红队版.zip (Cobalt Strike Kit)
    SHA256: b94d9412764529f264433c39b6043d43b96e824d016f40a5a38e26771374171f
    SHA1: 56bd833178c08baedb0a6f51c957a0cc8e6f9298
    MD5: 8c4d6f6c6db273d79a7c46b623e515e3
    xray_linux_amd64
    SHA256: 6e3c5f8444040e5982da9990cbb9d0ce66b7272a3e6804139e7cbe3083459035
    SHA1: 89b12a33628d5939bcedb53c908df9dbb24fe910
    MD5: 77915c856012baa7cd554041e7315317
    YeNoenXSQB.exe
    SHA265: fa301a12655598b9266a8315ac7f48da4f79ed4ea39273e57ac08b8c66b6fced
    SHA1: b7b0a37aee514c735913bfa8826faa4bbfc14556
    MD5: 2cc31da03228b31dae0a05065e9e1506
    f8x (ffffffff0x)
    SHA265: 206ac51c01604267c04f0966cdc685fd9ade42dd8d0698df639b06a0ed19377f
    SHA1: 2787930ac016783837e7d11903cd84c055356e4c
    MD5: 0658d07948a053da265ef693a64e9626
    LB3.exe (LockBit)
    SHA265: 07104f9be906e62be7539e4f81d980dddb480d64dce204c199a2afe5a0bc3367
    SHA1: f8ccc2503052eceebd5311a8b74dc197a4e9f68a
    MD5: c8033ec30b55a46ce7daf9d7d9b6b596
    TaoWu Cobalt Strike Kit - MD5
    f87afacff9c44b94db109e3e956a4b33  taowu-cobalt-strike-master/script/0803.exe
    98d006fbea457ec76243cab8f7f6631a  taowu-cobalt-strike-master/script/360bowser.exe
    8cda17f33d42754721ef2a87f3b5a984  taowu-cobalt-strike-master/script/ATPMiniDump.exe
    bfd92dedefe429205a635a38096429a2  taowu-cobalt-strike-master/script/BrowserGhost.exe
    201ebb467e02e63242ab4e0a21576f52  taowu-cobalt-strike-master/script/BypassAddUser.exe
    67a604d24c2478b19d80032dbc5a3d41  taowu-cobalt-strike-master/script/CVE-2020-0796.x64.dll
    13b2df26ffb467142106040cfa98e8dd  taowu-cobalt-strike-master/script/CVE-2021-1675.x64.dll
    251fe0878c16d68aa88405994c74a8d8  taowu-cobalt-strike-master/script/ClearnEventRecordID.ps1
    ee28414ff1bcbb3a6efd9a08f7baaf51  taowu-cobalt-strike-master/script/ClearnIpAddress.ps1
    1d0d8fb9803967c5b23c2e519e4c2cfe  taowu-cobalt-strike-master/script/ClearnTempLog.ps1
    5562f8aa216f87142dccc080506e2ad2  taowu-cobalt-strike-master/script/CredPhisher.exe
    f481acde58892cc1af01a009e73c3ae5  taowu-cobalt-strike-master/script/DecryptAutoLogon.exe
    fed5394f1b2a425d760e5ac9ee90d851  taowu-cobalt-strike-master/script/DecryptTeamViewer.exe
    f41eed0c700eb6961310b19449595af3  taowu-cobalt-strike-master/script/EfsPotato.exe
    f3ac9fb21d91fd283d6762a09fee8776  taowu-cobalt-strike-master/script/EncryptedZIP.exe
    a65b02f7ee85fec8580d69361df16350  taowu-cobalt-strike-master/script/FakeLogonScreen.exe
    bf1bbfd14c7cf3e72458a173c8e7f5a4  taowu-cobalt-strike-master/script/FullPowers.dll
    282b368bc42f506b58b83ae16e200544  taowu-cobalt-strike-master/script/GPSCoordinates.exe
    4f887be6011ea3e3d1b6afc41da2227d  taowu-cobalt-strike-master/script/Gopher.exe
    9cd740d0de919819ad00f73665c40500  taowu-cobalt-strike-master/script/InternalMonologue.exe
    38d1bf58e34b68a8836b352af978d6a1  taowu-cobalt-strike-master/script/Invoke-EternalBlue.ps1
    a63c52d46cb33e57f1f17beaa733ea65  taowu-cobalt-strike-master/script/Invoke-MS16032.ps1
    1dc27c44d74bf619aaf496963dfd67d6  taowu-cobalt-strike-master/script/Invoke-MS16135.ps1
    894aba8dfa538ba99c1453066824cc63  taowu-cobalt-strike-master/script/JuicyPotato.x64.dll
    28e874a7107b7e08e79e6efc63602609  taowu-cobalt-strike-master/script/JuicyPotato.x86.dll
    34fb77cd8902076f55071b218c494f77  taowu-cobalt-strike-master/script/KillEvenlogService.ps1
    2c2ddfb749aeeca32a9fd5fc20324b47  taowu-cobalt-strike-master/script/LPE_Reflect_Elevate.x64.dll
    3aa57bf8e7ea973cc793745de79033fa  taowu-cobalt-strike-master/script/Ladon.exe
    6b7bba769db3701e13214cb70ca5a54d  taowu-cobalt-strike-master/script/Ladon1.exe
    d0929362057fbcb2a9971222ef6db973  taowu-cobalt-strike-master/script/ListAllUsers.ps1
    fd18c734fa25bbacf0b7a6331d404126  taowu-cobalt-strike-master/script/ListLogged-inUsers.ps1
    e8a59e21ab61a7d615a7f8a407d72712  taowu-cobalt-strike-master/script/ListRDPConnections.exe
    13508e34428cf9611c8d7904b532e1b2  taowu-cobalt-strike-master/script/LocalSessionManager.ps1
    50c0e5c847f4a66fbcdda53e6555267f  taowu-cobalt-strike-master/script/MaceTrap.exe
    80926c91b6d82c4ad7f915bafa70e8d3  taowu-cobalt-strike-master/script/MiniDump.exe
    b8016d2f778b9c4c7d7a6347608fb18c  taowu-cobalt-strike-master/script/Net-GPPPassword.exe
    da296f6861a17738358b043ecc823bdc  taowu-cobalt-strike-master/script/NoAmci.exe
    b175bb17e17ba2f6a8826c9c90cb9c7e  taowu-cobalt-strike-master/script/NoPowerShell.exe
    4332225f7e3672c16f705a779dc360f5  taowu-cobalt-strike-master/script/RdpThief_x64.tmp
    976df0f9c9319c50a5ac20f4643dec4c  taowu-cobalt-strike-master/script/Recon-AD-AllLocalGroups.dll
    7e65a509b90b6e9fa0963803020280d9  taowu-cobalt-strike-master/script/Recon-AD-Computers.dll
    3f6b6935f5820196c69616e6bd8aa684  taowu-cobalt-strike-master/script/Recon-AD-Domain.dll
    7349fa84c7e2fced4885fea0ef0fec63  taowu-cobalt-strike-master/script/Recon-AD-Groups.dll
    66a7733af713c5beff9c76d0b6adbe6d  taowu-cobalt-strike-master/script/Recon-AD-LocalGroups.dll
    c69e7c0bac6b1846fcad05ee7fdd5023  taowu-cobalt-strike-master/script/Recon-AD-SPNs.dll
    bbee3a7a828af2a936e3e9a2931f2022  taowu-cobalt-strike-master/script/Recon-AD-Users.dll
    fb5fbc7c6b56a7a491532581faef5ee1  taowu-cobalt-strike-master/script/ReflectiveDll.x64.dll
    5ed0803ea91968c87994280f6432d43c  taowu-cobalt-strike-master/script/RegRdpPort.ps1
    cdaa0eda10dce813a0def8be3a669825  taowu-cobalt-strike-master/script/SPNSearcher.exe
    29321457a14c9722d76c9134781cf328  taowu-cobalt-strike-master/script/SafetyKatz.exe
    42de98c28dae64d104dcccc1d72e7834  taowu-cobalt-strike-master/script/Seatbelt.exe
    8885ae88e244f6bcf3089eba94e2cc87  taowu-cobalt-strike-master/script/SessionGopher.ps1
    d4969c3a7d88ad38f885a061bba26752  taowu-cobalt-strike-master/script/SessionSearcher.exe
    e06b24113cab27ff5a1173fa3f9e1615  taowu-cobalt-strike-master/script/SharPersist.exe
    755fa47d4527e9c93433e1887bd871ab  taowu-cobalt-strike-master/script/Sharp3389.exe
    74f79b71ba72dd55ca261ef789d243d6  taowu-cobalt-strike-master/script/SharpAVKB.exe
    205621408b7f84a5f451df233b0b87b1  taowu-cobalt-strike-master/script/SharpBypassUAC.exe
    7b5da1d6648103353216a0391638cee8  taowu-cobalt-strike-master/script/SharpChassisType.exe
    da478e7f17353b01d9ffa53aab0f0528  taowu-cobalt-strike-master/script/SharpCheckInfo.exe
    470acd82ade29f1ef29f198027771517  taowu-cobalt-strike-master/script/SharpChromium.exe
    f04164b15b9530d4b7ada28c1b9042b3  taowu-cobalt-strike-master/script/SharpClipHistory.exe
    44bac97f297c86a66b2af33eee7e4d8e  taowu-cobalt-strike-master/script/SharpCloud.exe
    df37fedde5fa9dc9d7a7ea7a87b71e10  taowu-cobalt-strike-master/script/SharpCrashEventLog.exe
    6f5764932e177157f307b33649968b5b  taowu-cobalt-strike-master/script/SharpDPAPI.exe
    6214cc7a0b9491b38a592be4d3032dd1  taowu-cobalt-strike-master/script/SharpDecryptPwd.exe
    3cf370a9f29a6b7ea83abac4a3141f26  taowu-cobalt-strike-master/script/SharpDecryptPwd2.exe
    34f645d8bf012f8f4965c1cd8857921f  taowu-cobalt-strike-master/script/SharpDir.exe
    98bacbfcc39e0dee46a0092699a56832  taowu-cobalt-strike-master/script/SharpDirLister.exe
    51cf67846561fe279e6e1c4bda712dbe  taowu-cobalt-strike-master/script/SharpDomainSpray.exe
    3a273a07749d17b50a4ec6387a54e2cc  taowu-cobalt-strike-master/script/SharpDoor.exe
    95fec2925ea9fa4a5181d491ea07f5e5  taowu-cobalt-strike-master/script/SharpDump.exe
    1ef929169b3309a01e850c6ff4e0064f  taowu-cobalt-strike-master/script/SharpEDRChecker.exe
    122413ef9a5f642703b1e8385c5dbad1  taowu-cobalt-strike-master/script/SharpEventLog.exe
    5b1c1007de5a2864d24276e3b1d293da  taowu-cobalt-strike-master/script/SharpExcelibur.exe
    03ee7c0c3822822b5e2373c4f532545a  taowu-cobalt-strike-master/script/SharpExec.exe
    a4f9bfa588427735f80e749ee341e819  taowu-cobalt-strike-master/script/SharpGPOAbuse.exe
    fe4f202c9595f6242903fbad0611eebb  taowu-cobalt-strike-master/script/SharpGetTitle.exe
    f6c2d2cc1e2016fddb7654822411ab2b  taowu-cobalt-strike-master/script/SharpHide.exe
    71eaf81214239027d5385a61e3917ab2  taowu-cobalt-strike-master/script/SharpHound.exe
    56892df95d1b9d78261587d5080630d1  taowu-cobalt-strike-master/script/SharpLocker.exe
    ea381b3247b6c2ed4d39973eca62669f  taowu-cobalt-strike-master/script/SharpMiniDump.exe
    bddf6c8e9a8229ed7667e3e1bb33aac9  taowu-cobalt-strike-master/script/SharpNetCheck.exe
    6181e5196eaeb14ec9ff798b43300ceb  taowu-cobalt-strike-master/script/SharpOXID-Find.exe
    56c33b2a06e3d68fe4e8b9421b36e902  taowu-cobalt-strike-master/script/SharpSCshell.exe
    09e471f71d1d66f5c8b407dfadce8ce5  taowu-cobalt-strike-master/script/SharpSQLDump.exe
    e390dbe577164988694d7aab5235e1af  taowu-cobalt-strike-master/script/SharpSQLTools.exe
    ccf2d0a5bbe52e80775900a2e18fe70f  taowu-cobalt-strike-master/script/SharpShares.exe
    d06c2c02133b810eb0111c6b4e34e940  taowu-cobalt-strike-master/script/SharpSpray.exe
    1d1478fddbf9b4128a4ecb85238c87b7  taowu-cobalt-strike-master/script/SharpSpray1.exe
    aca267b9a1ab0c97b8f88773d356220c  taowu-cobalt-strike-master/script/SharpStay.exe
    3f1abaf273e3ce16265a3f639945ff3e  taowu-cobalt-strike-master/script/SharpTask.exe
    dc443ffed5b96bee78ca2309d0f8fdca  taowu-cobalt-strike-master/script/SharpWeb.exe
    fc98ec23880eea7f0f701c5d66fa6892  taowu-cobalt-strike-master/script/SharpWebScan.exe
    1ca3ca7750b0ce2095a2f99d5b33177a  taowu-cobalt-strike-master/script/SharpWifiGrabber.exe
    e23e588319f82d826d3bf2c9fa4d1cba  taowu-cobalt-strike-master/script/SharpXDecrypt.exe
    bf2144fcf764bc3e5337fa3d2253232b  taowu-cobalt-strike-master/script/SharpZeroLogon.exe
    e73ca08a6937b95d8d5a90a33fcbc5c1  taowu-cobalt-strike-master/script/SharpZip.exe
    2ac4edf1110124560aeec330de7f8328  taowu-cobalt-strike-master/script/Shhmon.exe
    1de240d44557e7497ad1a1e144077805  taowu-cobalt-strike-master/script/SolarFlare.exe
    76fca31c99b232be1ec92d6b5762d97b  taowu-cobalt-strike-master/script/SpoolTrigger.x64.dll
    ad9382b2e7214d350f622f360f300ccf  taowu-cobalt-strike-master/script/SpoolTrigger.x86.dll
    a145f3345a4a2fd23b49dd299d0c3a83  taowu-cobalt-strike-master/script/Stealer.exe
    99d639417aa2a0ed7d188c85ea9ece23  taowu-cobalt-strike-master/script/StickyNotesExtract.exe
    624007937ba4931486c9bba5bb695688  taowu-cobalt-strike-master/script/SweetPotato.exe
    2d9777a0e299315b23d08955389154ed  taowu-cobalt-strike-master/script/Telemetry.exe
    817ddd444915bda25a5e81c1faa8978e  taowu-cobalt-strike-master/script/Telemetry3.5.exe
    ceb337687402e19efdf57264b2682d08  taowu-cobalt-strike-master/script/WMIHACKER.vbs
    9c444a9c1d75cbd07798110eeca1c3ce  taowu-cobalt-strike-master/script/Watson.exe
    2a449b2b65686a72525c98622e5bade7  taowu-cobalt-strike-master/script/WeblogicRCE.exe
    98d8bbeac624e77323f45256f6c87369  taowu-cobalt-strike-master/script/WireTap.exe
    1c96ec806a6e0a54cd7e0e78bb75eeb7  taowu-cobalt-strike-master/script/add-admin.exe
    3febcc80ab5ea418ef3e2103fe92d2e0  taowu-cobalt-strike-master/script/blocketw.exe
    4b1fdcf5cfa616fcaf411f3bff9acd75  taowu-cobalt-strike-master/script/blue.exe
    b3ec75c3a7454a096c65a99a0eb3073c  taowu-cobalt-strike-master/script/certexp.exe
    d7b669038c4860f1e3be02d389ed52d7  taowu-cobalt-strike-master/script/chfs.exe
    827cdfb4c1f1169c21ba84a194a70a0f  taowu-cobalt-strike-master/script/crack.exe
    c8c886ca25a381b22343a397f80a35c1  taowu-cobalt-strike-master/script/cve-2014-4113.x64.dll
    159801144740381f30e0ae4dfbfd62e6  taowu-cobalt-strike-master/script/cve-2014-4113.x86.dll
    e0e467f5597828a1d3c8abdbde8b6f17  taowu-cobalt-strike-master/script/cve-2015-1701.x64.dll
    dafc44bc1e488e1108449e39bcb147e1  taowu-cobalt-strike-master/script/cve-2015-1701.x86.dll
    e79195ab1fda13edac7a000cf8742802  taowu-cobalt-strike-master/script/cve-2016-0051.x86.dll
    600c41b3a161c5d2019767c87a7889ce  taowu-cobalt-strike-master/script/dazzleUP_Reflective_DLL.x64.dll
    5e4319826d24eacce3ca0738885722f3  taowu-cobalt-strike-master/script/dis_defender.exe
    d035f1c73e746553323924e3b61b3fb2  taowu-cobalt-strike-master/script/encode
    b5fac96201ab68d8a0c29eb8df6596e7  taowu-cobalt-strike-master/script/encode.exe
    58bbb92c36ee75183d2257b2ae64a0c2  taowu-cobalt-strike-master/script/hack-browser-data.exe
    0e51c36a7c45a2dea751fcb692102a6b  taowu-cobalt-strike-master/script/iox.exe
    73255c8357afd671c2256360d0be69cd  taowu-cobalt-strike-master/script/lazagne.exe
    5bd9a0f8a2f63622eb0d8bba2fb70fbb  taowu-cobalt-strike-master/script/napwd.exe
    5bd9a0f8a2f63622eb0d8bba2fb70fbb  taowu-cobalt-strike-master/script/navicatpwd.exe
    bb15b1dbc80dae1b9ac51455c72b44b4  taowu-cobalt-strike-master/script/noNetApiAdd.exe
    deca5d20a7fb145e288f39d4e4bd5042  taowu-cobalt-strike-master/script/rpcscan.dll
    dbff25033593278d05d2eee6cb9f44a6  taowu-cobalt-strike-master/script/scout.exe
    7c42df21e22b9c6cc87b2eebf219c01d  taowu-cobalt-strike-master/script/scrying.exe
    34daed0b12685ee391660f658b5980b5  taowu-cobalt-strike-master/script/sharpwmi.exe
    7728fc3821a7ff9c994258a36812e250  taowu-cobalt-strike-master/script/temp.exe
    dc6606879efe07595dfd968f8edf82f7  taowu-cobalt-strike-master/script/user.exe
    575b5020c27e3d7b14fee8b2b33c44e3  taowu-cobalt-strike-master/script/x64/PrintSpoofer.dll
    108da75de148145b8f056ec0827f1665  taowu-cobalt-strike-master/script/x64/PrintSpoofer.exe
    bd0f451c578f5a0b6c55e39e124db2fa  taowu-cobalt-strike-master/script/x64/bypass.exe
    d0139fda662f3ca949dd335c30573fa2  taowu-cobalt-strike-master/script/x64/frpc.exe
    9b0e4652a0317e6e4da66f29a74b5ad7  taowu-cobalt-strike-master/script/x64/fscan.exe
    a5a74d73fbf4a6f0b75f074de316277e  taowu-cobalt-strike-master/script/x64/nc.exe
    07edf20febc120edf731c4dc0d4d3b0b  taowu-cobalt-strike-master/script/x64/npc.exe
    5047fc7502bc9520fd2b9c26e8cbbd82  taowu-cobalt-strike-master/script/x86/PrintSpoofer.dll
    2a74db17b50025d13a63d947d8a8f828  taowu-cobalt-strike-master/script/x86/PrintSpoofer.exe
    11c1ffdff16dd42e33c8014f2b5360cd  taowu-cobalt-strike-master/script/x86/bypass.exe
    03f45692db10fe291de65f15ca9761af  taowu-cobalt-strike-master/script/x86/frpc.exe
    3505308cf3fd01398f1e4d1974b2438e  taowu-cobalt-strike-master/script/x86/fscan.exe
    8fa2d7a60d5bc36ead30c61d7b3608e7  taowu-cobalt-strike-master/script/x86/index.html
    f860286242afc5151d9ff68f0c7b8a56  taowu-cobalt-strike-master/script/x86/npc.exe
    Landon Cobalt Strike Kit - MD5
    1f040434a5bbaa855822ab4bed5fde2b  Ladon911/ChatLadon.exe
    9055f7437681be39b865326fad31cfd4  Ladon911/Ladon-cn.cna
    689aa7368a41586690d84a1a9d1b158a  Ladon911/Ladon.ps1
    59a5445907ea5f4e6db1cc4d47a0417e  Ladon911/Ladon911.exe
    31aa0419b32bf3b3228157f91c1a21fd  Ladon911/LadonExp.exe
    2242303952f6fb570b2484974b7771ba  Ladon911/LadonGUI.exe
    813fb29abbe42068283efaf665bea1c7  Ladon911/LadonShell.exe
    6153ce694983cf7e1c12e875d944e7e7  Ladon911/LadonStudy.exe
    486015a44a273c6c554a27b3d498365c  Ladon911/Newtonsoft.Json.dll
    
    Application Layer Protocol - T1071
    Data Encrypted for Impact - T1486
    Exploitation for Privilege Escalation - T1068
    Exploit Public-Facing Application - T1190
    Ingress Tool Transfer - T1105
    Vulnerability Scanning - T1595.002
    Web Protocols - T1071.001
    Wordlist Scanning - T1595.003