The analysis of the network traffic patterns associated with the Mythic framework confirms that while its modularity offers attackers flexibility, its default communication profiles leave distinct, detectable footprints. Despite the encryption, the initial handshake and data structure protocols create a static signature that can be exploited by defenders.
The network telemetry indicates that the "Achilles' heel" of Mythic's communication strategy, across SMB, TCP, and HTTP, is the consistent transmission of the agent's UUID at the beginning of the payload. Specifically, the analysis shows that the data structure follows a rigid pattern: a Base64-encoded string comprising the UUID followed by the AES-256 encrypted JSON blob. In P2P SMB and TCP traffic, this UUID transmission is preceded by a specific header structure (Total Size, Block Count, Block ID) which creates a predictable byte sequence. Regarding the covert channels like Discord and GitHub, the logs show that the API calls themselves, specifically the creation of messages in Discord channels or branches in GitHub repositories, often carry this same Base64 encoded UUID string in plaintext fields before the encrypted payload is processed. This allows for positive identification even when the actual command data is encrypted.
To detect this activity within your environment, I recommend the following hunting strategy.
Implement UUID Pattern Matching
Configure your IDS/IPS to scan for the specific UUID regex pattern `[a-z0-9]{8}\-[a-z0-9]{4}\-[a-z0-9]{4}\-[a-z0-9]{4}\-[a-z0-9]{12}` within the first 100 bytes of SMB pipes and TCP streams, as well as in the arguments of HTTP POST requests.
Monitor Specific API Volume
For encrypted channels where payload inspection is impossible, configure your SIEM to alert on high-frequency, periodic DNS queries or TLS sessions to `discord.com` and `api.github.com`, specifically looking for outlier volume from non-developer workstations.
Inspect TLS Certificates
If you have TLS interception capabilities, or if checking server logs, verify the SSL certificate subjects, default Mythic installations often utilize a self-signed certificate with the Organization Name simply set to "Mythic C2".
While post-exploitation frameworks evolve, the requirement to maintain a stable command channel forces attackers to use predictable protocols. By anchoring your detection logic on these structural necessities rather than ephemeral indicators like IP addresses, you significantly increase the cost of operation for the adversary.