heroui logo

Suspicious Cobalt Strike DNS Beaconing - DNS Client

Sigma Rules

View Source
Summary
This detection rule targets potential Cobalt Strike activity by monitoring DNS queries originating from the Windows DNS client. Cobalt Strike is commonly used in cyberattacks for command-and-control (C2) communication. Given its notorious use, detecting specific DNS behavior can help in identifying malicious beaconing to Cobalt Strike servers. The rule is designed to identify patterns in query names that are typical of this threat actor, specifically focusing on those that start with certain suspicious strings (like 'aaa.stage.' or 'post.1') as well as those containing specific patterns (like '.stage.123456.'). Alerting is triggered when an event with ID 3008 is logged, coupled with one of the specified DNS query conditions being fulfilled. This targeted approach allows for efficient detection of potential Cobalt Strike operations.
Categories
  • Network
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Network Traffic
  • Logon Session
Created: 2023-01-16