heroui logo

Plain HTTP POST Exfiltrated Data

Splunk Security Content

View Source
Summary
This detection rule aims to identify potential data exfiltration via plain HTTP POST requests, a tactic commonly utilized by malware and threat actors to communicate with command-and-control (C2) servers. The rule analyzes network traffic logs captured through the `stream_http` data source, focusing specifically on POST requests that include suspicious form data, particularly terms like "wermgr.exe" and "svchost.exe." Such patterns are indicative of malware behaviors, particularly from strains like Trickbot and other trojans or keyloggers. Confirming malicious activity here could imply unauthorized data exfiltration of sensitive information, which may compromise organizational security and lead to broader network infiltration or damage. The rule orchestrates a statistical overview, capturing various aspects of the HTTP requests, including source and destination IP addresses, user agents, and the volume of data in and out. This enables analysts to effectively monitor and respond to potential threats associated with HTTP POST-based exfiltration.
Categories
  • Network
  • Endpoint
Data Sources
  • Pod
ATT&CK Techniques
  • T1048.003
  • T1048
Created: 2024-11-15