Hunt Intelligence, Inc.’s Post

🌐 AdaptixC2 Uncovered: Capabilities, Tactics & Hunting Strategies Two months ago, we did a deep-dive to explore the lightweight yet full-featured command-and-control framework AdaptixC2. The research reveals how a modular, open-source C2 tool is being used in real operations with 102+ active servers across multiple countries, blending into cloud infrastructure just like any legitimate service. The research walks through how AdaptixC2 leverages HTTP, TCP and SMB channels, runtime API resolution and custom hashing to stay stealthy, while still offering operators extensive capabilities for system control, persistence, file operations, and lateral movement. Even with its flexibility and modular BOF design, our team uncovered reliable signs defenders can use, such as repeated TLS certificate reuse, default ports like 4321, and the recognizable “Server: AdaptixC2” header. If you missed this research, now is a great time to catch up ➡️ https://lnkd.in/din4UM95 #ThreatIntelligence #ThreatHunting #ThreatResearch #MalwareAnalysis

To view or add a comment, sign in

Explore content categories