Can you rank them in order?
Ten samples were used in this test.
The test will perform the following actions:
- Download the payload to the local machine
- Launch the payload
- The sample establishes a c2 connection (target server is a public cloud server)
- The target machine comes online
- The control side issues a command for a screenshot
- The control side issues a command to retrieve a txt file from the C drive (simulating data theft).
For an AV product to be considered approved, it must detect or block all of these malicious samples or behaviors. This is because Cobalt Strike is not novel and the samples are not difficult to detect.
10/10 (Success): WV, Kaspersky, Avast, F-S, Norton, Bitdefeder, Avira, ESET, G-Data, and Dr Web.
9/10: Huorong, Malwarebytes, Emsisoft, Comodo, and Trendmicro.
8/10: Webroot, and Adaware.
7/10: Qihoo, and McAfee.
6/10: Microsoft.
...
1/10: Panda, and Zemana
0/10: Watchdog, Immunet, Bkav, and Zillya.