heroui logo

Obfuscated IP Via CLI

Sigma Rules

View Source
Summary
The 'Obfuscated IP Via CLI' detection rule is designed to identify suspicious command line activity where an obfuscated or encoded version of an IP address is used. This behavior can be indicative of attempts to conceal malicious actions, as attackers often obfuscate their command lines to avoid detection by security systems. The rule specifically focuses on processes related to network operations, such as 'ping.exe' and 'arp.exe'. The detection logic utilizes a combination of command line filters and regular expressions to identify instances where the command line contains obfuscation patterns, such as hexadecimal and octal formats. It ensures that typical valid IP addresses are not incorrectly flagged as threats by employing a filter that matches common public IP address formats. This dual-level filtering helps improve the accuracy of detection while reducing false positives.
Categories
  • Network
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2022-08-03