
Summary
This rule is designed to detect potentially malicious programs that initiate connections to known malware callback ports based on statistical analysis sourced from two sandbox system databases. The detection mechanism operates over Windows network activities, specifically targeting network connections established by processes on the system. The rule looks for connections that are initiated to a predefined set of destination ports, which have been identified through previous malware analysis as commonly used for command-and-control (C2) communications. It employs strict filtering to exclude local IP ranges and certain system directories, hence minimizing false positives. The classification of the alert level is high due to the implications of discovering unauthorized callback communications, which could indicate the presence of persistent threats. The rule's operational framework encompasses continuous monitoring of network connections to strengthen the detection efficacy against potential threats, thereby aiding in identifying suspicious behavior indicative of malware activity. The underlying analysis of callback port traffic allows cybersecurity teams to proactively respond to and mitigate potential breaches or malicious activity.
Categories
- Network
- Endpoint
- Windows
Data Sources
- Network Traffic
- Process
Created: 2017-03-19