Malware C2 detection

It is just another malware campaign spread with CobaltStrike. We know an employee clicks on a link, downloads a file, and then network speed issues and anomalous traffic activity arises.

Questions

What is the name of the file downloaded from the CobaltStrike C2 connection?

_path=="http" | cut id.orig_h, id.resp_h, id.resp_p, method, host, uri | uniq -c
C2 download
4564.exe

What is the number of CobaltStrike connections using port 443?

_path=="conn" | 104.168.44.45 | 443 | count()
C2 connections
328

There is an additional C2 channel in used the given case. What is the name of the secondary C2 channel?

event_type=="alert" | cut alert.signature | sort -r | uniq -c | sort -r count
Another C2
IcedID
Another C2 Alert
Alert

Ai.