MALWARE-CNC -- Snort has detected a Comand and Control (CNC) rule violation, most likely for commands and calls for files or other stages from the control server. The alert indicates a host has been infiltrated by an attacker, who is using the host to make calls for files, as a call-home vector for other malware-infected networks, for shuttling traffic back to bot owners, etc.
MALWARE-CNC Win.Trojan.BlackRAT variant inbound connection
This event is generated when C2 traffic produced by BlackRAT is detected
A Network Trojan was detected
BlackRAT is a trojan that maintains contact with its C2 server by creating a sentinel file on the victim machine. It creates persistence by copying itself to multiple locations and can exfiltrate data to the C2 from the victim machine.
Ease of Attack:
What To Look For
No public information
No known false positives
Cisco Talos Intelligence Group
MITRE ATT&CK Framework
For reference, see the MITRE ATT&CK vulnerability types here:
CVE Additional Information