heroui logo

New Connection Initiated To Potential Dead Drop Resolver Domain

Sigma Rules

View Source
Summary
This detection rule identifies potential command-and-control activity by monitoring executable files that establish network connections to domains commonly used as dead drop resolvers in past cyberattacks. Dead drop resolvers are intermediary sites or services that attackers utilize to covertly communicate with compromised systems, often leveraging legitimate popular websites such as Facebook or YouTube to evade detection. The rule focuses on executable files that are not classified as common web browsers or known legitimate applications, as these can be indicative of malicious behavior. By analyzing the network traffic for connections to specific domains that have a history of use in such attacks, the rule aids in recognizing potential threats before they can cause significant harm. It employs a rigorous filtering mechanism to filter out legitimate browser instances and only flags unusual behavior.
Categories
  • Network
  • Endpoint
  • Windows
Data Sources
  • Process
  • Network Traffic
  • Application Log
Created: 2022-08-17