S0154 CobaltStrike DNS
S0154 - Cobalt Strike: DNS Beaconing¶
DESCRIPTION¶
Cobalt Strike is a famous Pen Test tool that is used by pen testers as well as attackers alike to compromise an environment. The query tries to detect suspicious DNS queries known from Cobalt Strike beacons.
Example:
aaa.stage.[encryptedstage].MaliciousDomain.com
baa.stage.[encryptedstage].MaliciousDomain.com
caa.stage.[encryptedstage].MaliciousDomain.com
post.[EncryptedData].[RandomValue].MaliciousDomain.com
Related
CobaltStrike
Reference:
https://github.com/SigmaHQ/sigma/blob/dcfb4c5c28431dcdc1d26ed4e008945965afd8ed/rules/network/dns/net_dns_mal_cobaltstrike.yml#L4
https://blog.sekoia.io/hunting-and-detecting-cobalt-strike
https://blog.gigamon.com/2017/07/26/footprints-of-fin7-tracking-actor-patterns-part-1
ATT&CK TACTICS¶
Data Source(s): Network Traffic
SENTINEL RULE QUERY¶
Triage¶
- Inspect DNS queries and destination IP
- Note source of endpoint beaconing
VERSION¶
Version 2.0 (date: 19/12/2023)