AdaptixC2 A New Open-Source Framework Leveraged in Real-Worl...#1398
Merged
carlospolop merged 7 commits intomasterfrom Sep 30, 2025
Conversation
added 2 commits
September 9, 2025 13:02
…l and ATS - Remove searchindex.js (auto-generated file)
… Real-Wor... - Remove searchindex.js (auto-generated file)
Collaborator
Author
🔗 Additional ContextOriginal Blog Post: https://unit42.paloaltonetworks.com/adaptixc2-post-exploitation-framework/ Content Categories: Based on the analysis, this content was categorized under "Basic Forensic Methodology -> Malware Analysis (add a page for AdaptixC2 config extraction and TTPs; cross-link to Windows persistence and in-memory execution)". Repository Maintenance:
Review Notes:
Bot Version: HackTricks News Bot v1.0 |
…to_remote_contr_20250909_125805
…n__From_NFC_heists_to_remote_contr_20250909_125805 The Rise of RatOn From NFC heists to remote control and ATS
…ork_Leveraged_i_20250910_123915
Collaborator
Author
|
merge |
88a07c5 to
73b307c
Compare
…ork_Leveraged_i_20250910_123915
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
What this post covers (published Sep 10, 2025; activity observed early May 2025)
Unit 42 details AdaptixC2, a modular open‑source post‑exploitation/C2 framework seen in real intrusions. The post explains agent types, configuration packing/crypto, concrete beacon configs, and two step‑by‑step infection chains featuring fileless PowerShell shellcode execution, persistence, and operational use.
Framework overview
• Agents: Windows x86/x64 beacons generated as EXE...
🔧 Technical Details
Fileless PowerShell shellcode via .NET dynamic invocation: Fetch an encoded (e.g., Base64/XOR) payload, decode/decrypt in memory, allocate RWX, copy shellcode, then execute with
Marshal.GetDelegateForFunctionPointeranddelegate.Invoke()to avoid writing binaries to disk and run the beacon in-process.RC4-packed config extraction from PE .rdata: Read
[uint32 size][ciphertext][16-byte RC4 key], decrypt theN-byte blob with the embedded key, then parse fields (servers/ports, HTTP method/URI/headers/UA/parameter, timing/opsec, listener type, chunk size). This enables automated clustering and IOC generation for AdaptixC2 samples.DLL search-order hijacking for persistence: Place a malicious
msimg32.dll(beacon) in a user-writable directory likely to be searched (e.g.,%APPDATA%\Microsoft\Windows\Templates). When a susceptible process loads the DLL by name, the beacon runs under...🤖 Agent Actions
I analyzed the Unit 42 post and the HackTricks repo, then added a new malware analysis page dedicated to AdaptixC2 with configuration extraction details and observed TTPs. I also cross-linked it from the main Malware Analysis page and referenced the Windows persistence and in-memory execution pages.
What I added/modified:
Why this placement:
No duplicate content was found in HackTricks about AdaptixC2; Cobalt Strike/Mythic pages are offensive/operator-focused, while this addition targets forensic/config extraction and detection content for AdaptixC2.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
📚 Repository Maintenance
All .md files have been checked for proper formatting (headers, includes, etc.).
🗑️ File Cleanup