heroui logo

Suspicious C2 Activities

Sigma Rules

View Source
Summary
The 'Suspicious C2 Activities' detection rule is focused on identifying potentially malicious behavior associated with command and control (C2) techniques as outlined in Florian Roth's 'Best Practice Auditd Configuration'. The rule specifically monitors the execution of various commands commonly employed by adversaries for establishing C2 channels. These commands include wget, curl, base64, netcat, ssh, and tools such as nmap and wireshark, which have legitimate uses but can also signal suspicious activity when used inappropriately. By integrating the detection of these commands, the rule addresses multiple tactics related to C2 communications, particularly the Application Layer Protocol (T1071) and Non-Application Layer Protocol (T1095), as well as Data Encoding (T1132). The specified commands, if triggered, can raise alerts concerning possible unauthorized or malicious data exfiltration or communication with external malicious servers.
Categories
  • Endpoint
  • Linux
Data Sources
  • Process
  • Application Log
ATT&CK Techniques
  • T1071
  • T1095
  • T1132
Created: 2020-05-18