Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This query identifies beaconing patterns from DNS logs based on recurrent frequency patterns. Such a potential outbound beaconing pattern to untrusted public networks should be investigated for any malware callbacks or data exfiltration attempts.
| Attribute | Value |
|---|---|
| Type | Hunting Query |
| Solution | DNS Essentials |
| ID | c4956c0b-4527-406c-b135-ef44002e1e70 |
| Tactics | CommandAndControl |
| Techniques | T1095, T1573, T1008, T1571, T1219 |
| Source | View on GitHub |
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊