We examine malicious Cobalt Strike case studies with distinct techniques using Malleable C2 profiles.