Network Connection Initiated To BTunnels Domains

Detects network connections to BTunnels domains initiated by a process on the system. Attackers can abuse that feature to establish a reverse shell or persistence on a machine.

Sigma rule (View on GitHub)

 1title: Network Connection Initiated To BTunnels Domains
 2id: 9e02c8ec-02b9-43e8-81eb-34a475ba7965
 3status: test
 4description: |
 5    Detects network connections to BTunnels domains initiated by a process on the system.
 6    Attackers can abuse that feature to establish a reverse shell or persistence on a machine.    
 7references:
 8    - https://defr0ggy.github.io/research/Utilizing-BTunnel-For-Data-Exfiltration/
 9author: Kamran Saifullah
10date: 2024-09-13
11tags:
12    - attack.exfiltration
13    - attack.command-and-control
14    - attack.t1567
15    - attack.t1572
16logsource:
17    category: network_connection
18    product: windows
19detection:
20    selection:
21        Initiated: 'true'
22        DestinationHostname|endswith: '.btunnel.co.in'
23    condition: selection
24falsepositives:
25    - Legitimate use of BTunnels will also trigger this.
26level: medium

References

Related rules

to-top