Detect Windows DNS Sigred Via Zeek

Description

This search detects SIGRed via Zeek DNS and Zeek Conn data.

Content Mapping

This content is not mapped to any local saved search. Add mapping


Use Case

Security Monitoring

Category

Adversary Tactics

Alert Volume

This search detects SIGRed via Zeek DNS and Zeek Conn data.

SPL Difficulty

None

Journey

Stage 3

MITRE ATT&CK Tactics

Execution

MITRE ATT&CK Techniques

Exploitation for Client Execution

Exploitation for Client Execution

MITRE Threat Groups

APT12
APT28
APT29
APT32
APT33
APT37
APT41
BRONZE BUTLER
BlackTech
Cobalt Group
Elderwood
Frankenstein
Inception
Lazarus Group
Leviathan
MuddyWater
Patchwork
Sandworm Team
TA459
The White Company
Threat Group-3390
Tropic Trooper
admin@338

Data Sources

DNS

   Help

Detect Windows DNS Sigred Via Zeek Help

You must be ingesting Zeek DNS and Zeek Conn data into Splunk. Zeek data should also be getting ingested in JSON format. We are detecting SIG and KEY records via bro:dns:json and TCP payload over 65KB in size via bro:conn:json. The Network Resolution and Network Traffic datamodels are in use for this search.

   Search

Open in Search