heroui logo

DNS TXT Answer with Possible Execution Strings

Sigma Rules

View Source
Summary
This detection rule identifies potentially malicious command execution strings present in DNS TXT records. The rule specifically looks for DNS responses of record type TXT that contain suspicious commands such as 'IEX', 'Invoke-Expression', and 'cmd.exe'. These commands are characteristic of various attack methodologies that leverage DNS to execute commands or download scripts, typically in a Command and Control (C2) scenario. Given the high level of risk associated with these strings, this rule is designed to monitor DNS traffic for anomalies that may indicate an ongoing attack or compromise. Security teams should consider implementing this detection as part of their network monitoring strategies to mitigate risks associated with misuse of DNS capabilities.
Categories
  • Network
Data Sources
  • Network Traffic
Created: 2018-08-08