
Summary
This rule detects instances where a Python process initiates a network connection, which can be indicative of benign activities such as package installations or potentially malicious behavior where a script may be communicating with a command and control (C&C) server. The detection mechanism focuses on identifying network connections initiated by processes containing 'python' in their image name and ensuring that the connections are not part of known safe patterns (e.g., communication over localhost or executed from Anaconda tools for legitimate purposes). Optional filters are included to specifically account for situations where benign Python scripts might run, particularly for users of the Anaconda distribution or Jupyter Notebooks. The rule emphasizes caution to reduce false positives by indicating that legitimate scripts may trigger the detection, necessitating baseline monitoring before deployment.
Categories
- Endpoint
- Network
Data Sources
- Process
- Network Traffic
ATT&CK Techniques
- T1046
Created: 2021-12-10