Tracking Pyramid C2: Identifying Post-Exploitation Servers in Hunt

Feb. 13, 2025, 10:12 a.m.

Description

Pyramid, an open-source post-exploitation framework in Python, is being used by threat actors for malicious purposes. The tool features a lightweight HTTP/S server for encrypted payload delivery, blending with legitimate Python activity. This analysis examines Pyramid's server, outlines network signatures for detection, and highlights recently identified servers. The infrastructure exhibits distinctive HTTP response patterns, allowing for structured detection queries. Nine IP addresses across different ports were identified matching the criteria. Three of these IPs were previously associated with RansomHub activities. The post emphasizes the importance of proactive detection strategies to counter evolving tactics by adversaries using open-source offensive security tools.

Date

  • Created: Feb. 13, 2025, 9:03 a.m.
  • Published: Feb. 13, 2025, 9:03 a.m.
  • Modified: Feb. 13, 2025, 10:12 a.m.

Attack Patterns

  • SpicyOmelette
  • Terra Loader
  • SKID
  • More_eggs - S0284
  • TA4557
  • T1021
  • T1573
  • T1105
  • T1071
  • T1102
  • T1219
  • T1132
  • T1190
  • T1133
  • T1090

Additional Informations

  • Poland