
Summary
The detection rule identifies suspicious DNS beaconing patterns commonly associated with Cobalt Strike within Windows environments. Specifically, it detects applications that generate DNS queries beginning with 'aaa.stage.' or 'post.1', or those that contain '.stage.123456.'. These DNS queries are indicative of command-and-control (C2) activity linked to malicious actors leveraging Cobalt Strike for post-exploitation communications. The rule operates within the context of Sysmon logs and focuses on the DNS query logs generated by Windows. If an application is found to violate the specified selection criteria, it triggers an alert. The author is Florian Roth from Nextron Systems, and additional references can be found in the associated articles to provide more context on the detection logic and implications of Cobalt Strike attacks.
Categories
- Windows
Data Sources
- Windows Registry
- Network Traffic
Created: 2021-11-09