MALWARE-CNC -- Snort has detected a Comand and Control (CNC) rule violation, most likely for commands and calls for files or other stages from the control server. The alert indicates a host has been infiltrated by an attacker, who is using the host to make calls for files, as a call-home vector for other malware-infected networks, for shuttling traffic back to bot owners, etc.
MALWARE-CNC MultiOS.Trojan.DarkUtilities variant outbound connection
Dark Utilities makes use of a custom TCP protocol for status updates, also known as heartbeats and keep-alives. This rule detects such communications.
This rule will alert when detecting a custom keep-alive packet to a C2 service related to Dark Utilities.
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
None
No information provided
None
Tactic: Command and Control
Technique: Custom Command and Control Protocol
For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org