
Summary
This detection rule identifies potentially suspicious DNS queries that include base64 encoded strings. It focuses on DNS query patterns that contain the substring '==.', which is commonly found in base64 encodings. The analysis performed by this rule is crucial as threat actors can utilize these encoded strings to exfiltrate data or communicate with command-and-control servers without raising immediate alarms. The rule is targeted at detecting instances where base64 encoded data is improperly utilized within DNS queries, which is indicative of data exfiltration attempts or covert command-and-control communications. Given its medium severity level, it aims to filter out unknown false positives while ensuring that any unusual behavior is flagged for further investigation.
Categories
- Network
- Endpoint
- Cloud
Data Sources
- Network Traffic
- Process
- Application Log
Created: 2018-05-10