Hunting Malware
RATs
Used to gain remote access to a machine
Typically come with other AV and detection evasion techniques that make them different than other payloads
Typically uses a client-server model and comes with an interface for easy administration
Examples:
Xeexe
Quasar
Hunting Rats and C2 Servers
<RuleGroup name="" groupRelation="or">
<NetworkConnect onmatch="include">
<DestinationPort condition="is">1034</DestinationPort>
<DestinationPort condition="is">1604</DestinationPort>
</NetworkConnect>
<NetworkConnect onmatch="exclude">
<Image condition="image">OneDrive.exe</Image>
</NetworkConnect>
</RuleGroup>
Hunting for Common Back Connect Ports with PowerShell
Get-WinEvent -Path <Path to Log> -FilterXPath '*/System/EventID=3 and */EventData/Data[@Name="DestinationPort"] and */EventData/Data=<Port>'
Further Reading
Last updated