Network Reconnaissance Activity
Detects a set of suspicious network related commands often used in recon stages
Sigma rule (View on GitHub)
1title: Network Reconnaissance Activity
2id: e6313acd-208c-44fc-a0ff-db85d572e90e
3status: test
4description: Detects a set of suspicious network related commands often used in recon stages
5references:
6 - https://thedfirreport.com/2022/02/07/qbot-likes-to-move-it-move-it/
7author: Florian Roth (Nextron Systems)
8date: 2022-02-07
9tags:
10 - attack.discovery
11 - attack.t1087
12 - attack.t1082
13 - car.2016-03-001
14logsource:
15 category: process_creation
16 product: windows
17detection:
18 selection:
19 CommandLine|contains|all:
20 - 'nslookup'
21 - '_ldap._tcp.dc._msdcs.'
22 condition: selection
23falsepositives:
24 - False positives depend on scripts and administrative tools used in the monitored environment
25level: high
References
Related rules
- Reconnaissance Activity Using BuiltIn Commands
- Bitbucket User Details Export Attempt Detected
- Cisco Discovery
- Container Residence Discovery Via Proc Virtual FS
- Docker Container Discovery Via Dockerenv Listing