""ET TROJAN DNSG - Data Exfiltration via DNS""

SID: 2028631

Revision: 2

Class Type: trojan-activity

Metadata: attack_target Client_and_Server, created_at 2019_09_19, deployment Perimeter, deployment Internal, performance_impact Low, signature_severity Major, tag DNS_tunneling, updated_at 2019_09_19

Reference:

Protocol: udp

Source Network: $HOME_NET

Source Port: any

Destination Network: any

Destination Port: 53

Flow:

Contents:

  • Value: "|01|" Depth: 1 Offset: 2

  • Value: "|00 01 00 00 00 00 00|"

  • Value: "|00 00 13 00 01|"

Within: 5

PCRE: "/^.[\x14-\x50][A-Za-z0-9-_.]{20,80}\x04[a-z]{2}\d{2}\x03com/R"

Special Options:

source