Rule Library

Sigma Rules

315 rules found for "command-and-control"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Telegram API Access

Detects suspicious requests to Telegram API without the usual Telegram User-Agent

Proxy Log
TA0005 · Defense EvasionTA0011 · Command and ControlT1071.001 · Web ProtocolsT1102.002 · Bidirectional Communication
Florian Roth (Nextron Systems)Tue Jun 05web
Detectionhightest

APT User Agent

Detects suspicious user agent strings used in APT malware in proxy logs

Proxy Log
TA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)+1Tue Nov 12web
Detectionmediumtest

Suspicious Base64 Encoded User-Agent

Detects suspicious encoded User-Agent strings, as seen used by some malware.

Proxy Log
TA0011 · Command and ControlT1071.001 · Web Protocols
Nasreddine Bencherchali (Nextron Systems)Thu May 04web
Detectionhightest

Bitsadmin to Uncommon IP Server Address

Detects Bitsadmin connections to IP addresses instead of FQDN names

Proxy Log
TA0011 · Command and ControlT1071.001 · Web ProtocolsTA0005 · Defense EvasionTA0003 · Persistence+2
Florian Roth (Nextron Systems)Fri Jun 10web
Detectionhightest

Bitsadmin to Uncommon TLD

Detects Bitsadmin connections to domains with uncommon TLDs

Proxy Log
TA0011 · Command and ControlT1071.001 · Web ProtocolsTA0005 · Defense EvasionTA0003 · Persistence+2
Florian Roth (Nextron Systems)+1Thu Mar 07web
Detectionhightest

Crypto Miner User Agent

Detects suspicious user agent strings used by crypto miners in proxy logs

Proxy Log
TA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)Mon Oct 21web
Detectionmediumtest

HTTP Request With Empty User Agent

Detects a potentially suspicious empty user agent strings in proxy log. Could potentially indicate an uncommon request method.

Proxy Log
TA0005 · Defense EvasionTA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)Sat Jul 08web
Detectionhightest

Exploit Framework User Agent

Detects suspicious user agent strings used by exploit / pentest frameworks like Metasploit in proxy logs

Proxy Log
TA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)Sat Jul 08web
Detectionhightest

Malware User Agent

Detects suspicious user agent strings used by malware in proxy logs

Proxy Log
TA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)+2Sat Jul 08web
Detectionmediumtest

Windows PowerShell User Agent

Detects Windows PowerShell Web Access

Proxy Log
TA0005 · Defense EvasionTA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)Mon Mar 13web
Detectionhightest

Suspicious User Agent

Detects suspicious malformed user agent strings in proxy logs

Proxy Log
TA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)Sat Jul 08web
Detectionmediumtest

Potential Base64 Encoded User-Agent

Detects User Agent strings that end with an equal sign, which can be a sign of base64 encoding.

Proxy Log
TA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)+1Fri Jul 08web
Detectionhightest

Atera Agent Installation

Detects successful installation of Atera Remote Monitoring & Management (RMM) agent as recently found to be used by Conti operators

Windowsapplication
TA0011 · Command and Controlattack.t1219.002
Bhabesh RajWed Sep 01windows
Detectioncriticaltest

Suspicious Cobalt Strike DNS Beaconing - DNS Client

Detects a program that invoked suspicious DNS queries known from Cobalt Strike beacons

Windowsdns-client
T1071.004 · DNSTA0011 · Command and Control
Nasreddine Bencherchali (Nextron Systems)Mon Jan 16windows
Detectionmediumtest

DNS Query To Put.io - DNS Client

Detects DNS queries for subdomains related to "Put.io" sharing website.

Windowsdns-client
TA0011 · Command and Control
Omar KhaledFri Aug 23windows
Detectionhightest

Query Tor Onion Address - DNS Client

Detects DNS resolution of an .onion address related to Tor routing networks

Windowsdns-client
TA0011 · Command and ControlT1090.003 · Multi-hop Proxy
Nasreddine Bencherchali (Nextron Systems)Sun Feb 20windows
Detectionmediumtest

Potential Remote Desktop Connection to Non-Domain Host

Detects logons using NTLM to hosts that are potentially not part of the domain.

Windowsntlm
TA0011 · Command and Controlattack.t1219.002
James PembertonFri May 22windows
Detectionhightest

RDP over Reverse SSH Tunnel WFP

Detects svchost hosting RDP termsvcs communicating with the loopback address

Windowssecurity
TA0005 · Defense EvasionTA0011 · Command and ControlTA0008 · Lateral MovementT1090.001 · Internal Proxy+3
Samir BousseadenSat Feb 16windows
Detectionhightest

Suspicious LDAP-Attributes Used

Detects the usage of particular AttributeLDAPDisplayNames, which are known for data exchange via LDAP by the tool LDAPFragger and are additionally not commonly used in companies.

Windowssecurity
T1001.003 · Protocol ImpersonationTA0011 · Command and Control
xknowSun Mar 24windows
Detectionhightest

Password Protected ZIP File Opened (Suspicious Filenames)

Detects the extraction of password protected ZIP archives with suspicious file names. See the filename variable for more details on which file has been opened.

Windowssecurity
TA0011 · Command and ControlTA0005 · Defense EvasionT1027 · Obfuscated Files or InformationT1105 · Ingress Tool Transfer+1
Florian Roth (Nextron Systems)Mon May 09windows
Detectionmediumtest

Mesh Agent Service Installation

Detects a Mesh Agent service installation. Mesh Agent is used to remotely manage computers

Windowssystem
TA0011 · Command and Controlattack.t1219.002
Nasreddine Bencherchali (Nextron Systems)Mon Nov 28windows
Detectionhightest

Sliver C2 Default Service Installation

Detects known malicious service installation that appear in cases in which a Sliver implants execute the PsExec commands

Windowssystem
TA0003 · PersistenceTA0002 · ExecutionTA0004 · Privilege EscalationT1543.003 · Windows Service+1
Florian Roth (Nextron Systems)+1Thu Aug 25windows
Detectionmediumtest

TacticalRMM Service Installation

Detects a TacticalRMM service installation. Tactical RMM is a remote monitoring & management tool.

Windowssystem
TA0011 · Command and Controlattack.t1219.002
Nasreddine Bencherchali (Nextron Systems)Mon Nov 28windows
Detectionhightest

Ngrok Usage with Remote Desktop Service

Detects cases in which ngrok, a reverse proxy tool, forwards events to the local RDP port, which could be a sign of malicious behaviour

Windowsterminalservices-localsessionmanager
TA0011 · Command and ControlT1090 · Proxy
Florian Roth (Nextron Systems)Fri Apr 29windows
Detectionmediumtest

AppX Package Installation Attempts Via AppInstaller.EXE

Detects DNS queries made by "AppInstaller.EXE". The AppInstaller is the default handler for the "ms-appinstaller" URI. It attempts to load/install a package from the referenced URL

WindowsDNS Query
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
François HubautWed Nov 24windows
Detectionmediumtest

Cloudflared Tunnels Related DNS Requests

Detects DNS requests to Cloudflared tunnels domains. Attackers can abuse that feature to establish a reverse shell or persistence on a machine.

WindowsDNS Query
TA0011 · Command and ControlT1071.001 · Web ProtocolsT1572 · Protocol Tunneling
Nasreddine Bencherchali (Nextron Systems)Wed Dec 20windows
Detectionmediumexperimental

DNS Query To Common Malware Hosting and Shortener Services

Detects DNS queries to domains commonly used by threat actors to host malware payloads or redirect through URL shorteners. These include platforms like Cloudflare Workers, TryCloudflare, InfinityFree, and URL shorteners such as tinyurl and lihi.cc. Such DNS activity can indicate potential delivery or command-and-control communication attempts.

WindowsDNS Query
TA0011 · Command and ControlT1071.004 · DNS
Ahmed NosirMon Jun 02windows
Detectionmediumtest

DNS Query To Devtunnels Domain

Detects DNS query requests to Devtunnels domains. Attackers can abuse that feature to establish a reverse shell or persistence on a machine.

WindowsDNS Query
TA0011 · Command and ControlT1071.001 · Web ProtocolsT1572 · Protocol Tunneling
citron_ninjaWed Oct 25windows
Detectionmediumtest

DNS Query To AzureWebsites.NET By Non-Browser Process

Detects a DNS query by a non browser process on the system to "azurewebsites.net". The latter was often used by threat actors as a malware hosting and exfiltration site.

WindowsDNS Query
TA0011 · Command and Controlattack.t1219.002
Nasreddine Bencherchali (Nextron Systems)Mon Jun 24windows
Detectionhighexperimental

DNS Query by Finger Utility

Detects DNS queries made by the finger utility, which can be abused by threat actors to retrieve remote commands for execution on Windows devices. In one ClickFix malware campaign, adversaries leveraged the finger protocol to fetch commands from a remote server. Since the finger utility is not commonly used in modern Windows environments, its presence already raises suspicion. Investigating such DNS queries can also help identify potential malicious infrastructure used by threat actors for command and control (C2) communication.

WindowsDNS Query
TA0011 · Command and ControlT1071.004 · DNSTA0002 · ExecutionT1059.003 · Windows Command Shell
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Nov 19windows
Detectioncriticaltest

Suspicious Cobalt Strike DNS Beaconing - Sysmon

Detects a program that invoked suspicious DNS queries known from Cobalt Strike beacons

WindowsDNS Query
TA0011 · Command and ControlT1071.004 · DNS
Florian Roth (Nextron Systems)Tue Nov 09windows
Detectionlowexperimental

DNS Query Request By QuickAssist.EXE

Detects DNS queries initiated by "QuickAssist.exe" to Microsoft Quick Assist primary endpoint that is used to establish a session.

WindowsDNS Query
TA0011 · Command and ControlTA0001 · Initial AccessTA0008 · Lateral MovementT1071.001 · Web Protocols+1
Muhammad FaisalThu Dec 19windows
Detectionmediumtest

DNS Query To Remote Access Software Domain From Non-Browser App

An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target systems within networks. These services are commonly used as legitimate technical support software, and may be allowed by application control within a target environment. Remote access tools like VNC, Ammyy, and Teamviewer are used frequently when compared with other legitimate software commonly used by adversaries. (Citation: Symantec Living off the Land)

WindowsDNS Query
TA0011 · Command and Controlattack.t1219.002
François Hubaut+1Mon Jul 11windows
Detectionmediumtest

TeamViewer Domain Query By Non-TeamViewer Application

Detects DNS queries to a TeamViewer domain only resolved by a TeamViewer client by an image that isn't named TeamViewer (sometimes used by threat actors for obfuscation)

WindowsDNS Query
TA0011 · Command and Controlattack.t1219.002
Florian Roth (Nextron Systems)Sun Jan 30windows
Detectionhightest

DNS Query Tor .Onion Address - Sysmon

Detects DNS queries to an ".onion" address related to Tor routing networks

WindowsDNS Query
TA0011 · Command and ControlT1090.003 · Multi-hop Proxy
François HubautSun Feb 20windows
Detectionmediumtest

DNS Query To Visual Studio Code Tunnels Domain

Detects DNS query requests to Visual Studio Code tunnel domains. Attackers can abuse that feature to establish a reverse shell or persistence on a machine.

WindowsDNS Query
TA0011 · Command and ControlT1071.001 · Web Protocols
citron_ninjaWed Oct 25windows
Detectionmediumtest

ADSI-Cache File Creation By Uncommon Tool

Detects the creation of an "Active Directory Schema Cache File" (.sch) file by an uncommon tool.

WindowsFile Event
T1001.003 · Protocol ImpersonationTA0011 · Command and Control
xknow+1Sun Mar 24windows
Detectionmediumtest

Anydesk Temporary Artefact

An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target systems within networks. These services are commonly used as legitimate technical support software, and may be allowed by application control within a target environment. Remote access tools like VNC, Ammyy, and Teamviewer are used frequently when compared with other legitimate software commonly used by adversaries. (Citation: Symantec Living off the Land)

WindowsFile Event
TA0011 · Command and Controlattack.t1219.002
François HubautFri Feb 11windows
Detectionhightest

Suspicious Binary Writes Via AnyDesk

Detects AnyDesk writing binary files to disk other than "gcapi.dll". According to RedCanary research it is highly abnormal for AnyDesk to write executable files to disk besides gcapi.dll, which is a legitimate DLL that is part of the Google Chrome web browser used to interact with the Google Cloud API. (See reference section for more details)

WindowsFile Event
TA0011 · Command and Controlattack.t1219.002
Nasreddine Bencherchali (Nextron Systems)Wed Sep 28windows
Detectionhighexperimental

Suspicious File Created by ArcSOC.exe

Detects instances where the ArcGIS Server process ArcSOC.exe, which hosts REST services running on an ArcGIS server, creates a file with suspicious file type, indicating that it may be an executable, script file, or otherwise unusual.

WindowsFile Event
TA0005 · Defense EvasionTA0011 · Command and ControlTA0003 · PersistenceTA0001 · Initial Access+3
Micah BabinskiTue Nov 25windows
Detectionmediumexperimental

Potentially Suspicious File Creation by OpenEDR's ITSMService

Detects the creation of potentially suspicious files by OpenEDR's ITSMService process. The ITSMService is responsible for remote management operations and can create files on the system through the Process Explorer or file management features. While legitimate for IT operations, creation of executable or script files could indicate unauthorized file uploads, data staging, or malicious file deployment.

WindowsFile Event
TA0011 · Command and ControlT1105 · Ingress Tool TransferTA0008 · Lateral MovementT1570 · Lateral Tool Transfer+1
kostastsaleThu Feb 19windows
Detectionlowexperimental

Suspicious Deno File Written from Remote Source

Detects Deno writing a file from a direct HTTP(s) call and writing to the appdata folder or bringing it's own malicious DLL. This behavior may indicate an attempt to execute remotely hosted, potentially malicious files through deno.

WindowsFile Event
TA0002 · ExecutionT1204 · User ExecutionT1059.007 · JavaScriptTA0011 · Command and Control+1
Josh Nickels+1Thu May 22windows
Detectionmediumtest

GoToAssist Temporary Installation Artefact

An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target systems within networks. These services are commonly used as legitimate technical support software, and may be allowed by application control within a target environment. Remote access tools like VNC, Ammyy, and Teamviewer are used frequently when compared with other legitimate software commonly used by adversaries. (Citation: Symantec Living off the Land)

WindowsFile Event
TA0011 · Command and Controlattack.t1219.002
François HubautSun Feb 13windows
Detectioncriticaltest

HackTool - Inveigh Execution Artefacts

Detects the presence and execution of Inveigh via dropped artefacts

WindowsFile Event
TA0011 · Command and Controlattack.t1219.002
Nasreddine Bencherchali (Nextron Systems)Mon Oct 24windows
Detectionhightest

HackTool - RemoteKrbRelay SMB Relay Secrets Dump Module Indicators

Detects the creation of file with specific names used by RemoteKrbRelay SMB Relay attack module.

WindowsFile Event
TA0011 · Command and Controlattack.t1219.002
Nasreddine Bencherchali (Nextron Systems)Thu Jun 27windows
Detectionmediumtest

Installation of TeamViewer Desktop

TeamViewer_Desktop.exe is create during install

WindowsFile Event
TA0011 · Command and Controlattack.t1219.002
François HubautFri Jan 28windows
Detectionmediumtest

New Outlook Macro Created

Detects the creation of a macro file for Outlook.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceTA0011 · Command and ControlT1137 · Office Application Startup+2
@scoubimtlMon Apr 05windows
Detectionhightest

Suspicious Outlook Macro Created

Detects the creation of a macro file for Outlook.

WindowsFile Event
TA0004 · Privilege EscalationTA0003 · PersistenceTA0011 · Command and ControlT1137 · Office Application Startup+2
Nasreddine Bencherchali (Nextron Systems)Wed Feb 08windows