AdaptixC2 A New Open-Source Framework Leveraged in Real-Worl... #1398
+261
−1
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
What this post covers (published Sep 10, 2025; activity observed early May 2025)
Unit 42 details AdaptixC2, a modular open‑source post‑exploitation/C2 framework seen in real intrusions. The post explains agent types, configuration packing/crypto, concrete beacon configs, and two step‑by‑step infection chains featuring fileless PowerShell shellcode execution, persistence, and operational use.
Framework overview
• Agents: Windows x86/x64 beacons generated as EXE...
🔧 Technical Details
Fileless PowerShell shellcode via .NET dynamic invocation: Fetch an encoded (e.g., Base64/XOR) payload, decode/decrypt in memory, allocate RWX, copy shellcode, then execute with
Marshal.GetDelegateForFunctionPointer
anddelegate.Invoke()
to avoid writing binaries to disk and run the beacon in-process.RC4-packed config extraction from PE .rdata: Read
[uint32 size][ciphertext][16-byte RC4 key]
, decrypt theN
-byte blob with the embedded key, then parse fields (servers/ports, HTTP method/URI/headers/UA/parameter, timing/opsec, listener type, chunk size). This enables automated clustering and IOC generation for AdaptixC2 samples.DLL search-order hijacking for persistence: Place a malicious
msimg32.dll
(beacon) in a user-writable directory likely to be searched (e.g.,%APPDATA%\Microsoft\Windows\Templates
). When a susceptible process loads the DLL by name, the beacon runs under...🤖 Agent Actions
I analyzed the Unit 42 post and the HackTricks repo, then added a new malware analysis page dedicated to AdaptixC2 with configuration extraction details and observed TTPs. I also cross-linked it from the main Malware Analysis page and referenced the Windows persistence and in-memory execution pages.
What I added/modified:
Why this placement:
No duplicate content was found in HackTricks about AdaptixC2; Cobalt Strike/Mythic pages are offensive/operator-focused, while this addition targets forensic/config extraction and detection content for AdaptixC2.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
📚 Repository Maintenance
All .md files have been checked for proper formatting (headers, includes, etc.).
🗑️ File Cleanup