""ET TROJAN FrameworkPOS Covert DNS CnC Beacon 1""

SID: 2019454

Revision: 2

Class Type: trojan-activity

Metadata: attack_target Client_Endpoint, created_at 2014_10_16, deployment Perimeter, signature_severity Major, tag c2, updated_at 2019_08_28, mitre_tactic_id TA0011, mitre_tactic_name Command_And_Control, mitre_technique_id T1041, mitre_technique_name Exfiltration_Over_C2_Channel

Reference:

Protocol: udp

Source Network: $HOME_NET

Source Port: any

Destination Network: any

Destination Port: 53

Flow:

Contents:

  • Value: "|01|" Depth: 1 Offset: 2

  • Value: "|00 01 00 00 00 00 00|"

  • Value: "dc"

  • Value: "|06|beacon"

Offset: 12

Within: 7

PCRE: "/^\x0e-\x1e{1,3}(?:dc(?:[a-f0-9]{2}){1,3}){3}.[a-f0-9]{2}/Ri"

Special Options:

  • nocase

  • nocase

  • fast_pattern

source