Ping Hex IP
Detects a ping command that uses a hex encoded IP address
Sigma rule (View on GitHub)
1title: Ping Hex IP
2id: 1a0d4aba-7668-4365-9ce4-6d79ab088dfd
3status: test
4description: Detects a ping command that uses a hex encoded IP address
5references:
6 - https://github.com/vysecurity/Aggressor-VYSEC/blob/0d61c80387b9432dab64b8b8a9fb52d20cfef80e/ping.cna
7 - https://twitter.com/vysecurity/status/977198418354491392
8author: Florian Roth (Nextron Systems)
9date: 2018-03-23
10modified: 2022-01-07
11tags:
12 - attack.defense-evasion
13 - attack.t1140
14 - attack.t1027
15logsource:
16 category: process_creation
17 product: windows
18detection:
19 selection:
20 Image|endswith: '\ping.exe'
21 CommandLine|contains: '0x'
22 condition: selection
23fields:
24 - ParentCommandLine
25falsepositives:
26 - Unlikely, because no sane admin pings IP addresses in a hexadecimal form
27level: high
References
Related rules
- Base64 Encoded PowerShell Command Detected
- Suspicious XOR Encoded PowerShell Command
- Certificate Exported Via Certutil.EXE
- ConvertTo-SecureString Cmdlet Usage Via CommandLine
- DNS-over-HTTPS Enabled by Registry