
Summary
This rule is designed to detect Internet Relay Chat (IRC) protocol activity directed to the Internet. IRC operates using common TCP ports (6667 and 6697) and is primarily used for text chat and file transfers. Due to its features, IRC is often exploited for command and control operations in malware scenarios, making it essential for threat detection. The rule operates by analyzing network traffic categorized as such, focusing on TCP communications to specific destination ports. It flags potential malicious activity based on the source and destination IP addresses to identify traffic that should typically remain internal. Unusual IRC traffic that originates from non-engineering users or involves production servers is a significant red flag. While normal behavior can involve IRC by developers, extraordinary activities or communications that deviate from standard operational patterns warrant attention and further investigation. Users should remain mindful of possible false positives due to the ephemeral nature of the ports used and other benign applications that might also utilize these ports under specific network conditions, especially in NAT environments.
Categories
- Network
- Endpoint
- Cloud
Data Sources
- Network Traffic
- Process
- Application Log
ATT&CK Techniques
- T1048
Created: 2020-02-18