DDI RULE 5030
May 17, 2024
  
    
            
            
          DESCRIPTION NAME: 
MIMIC C2 - HTTP (Request)
  CONFIDENCE LEVEL: MEDIUM
  SEVERITY INBOUND: 
  SEVERITY OUTBOUND: 
Informational
Low
Medium
High
OVERVIEW
This is Trend Micro detection for packets passing through HTTP network protocols that manifests Callback activities which can be a potential intrusion. Below are some indicators of unusual behavior:
- Suspicious activity in administrator or privileged accounts
 - Dubious logins, access, and other network activities that indicate probing or brute force attacks
 - Anomalous spike of requests
 - Network traffic that traverses in unusually used ports
 - Unknown files, applications, and processes in the system
 - Unusual traffic going in and out of the network
 - Unusual message or file structure
 
TECHNICAL DETAILS
Attack Phase: Command and Control Communication
Protocol: HTTP
Risk Type: MALWARE
Threat Type: Suspicious Behavior
Confidence Level: Medium
Severity: Medium(Outbound)
DDI Default Rule Status: Enable
Event Class: Callback
Event Sub Class: Malware
Behavior Indicator: Callback
APT Related: NO
SOLUTION
 Network Content Inspection Pattern Version: 1.15675.00
 Network Content Inspection Pattern Release Date: 15 May 2024
 Network Content Correlation Pattern Version: 1.15447.00 
 Network Content Correlation Pattern Release Date: 15 May 2024
Immediate Action
- Update your Trend Micro products and pattern files to the latest version.
 - Scan the host exhibiting this type of network behavior to clean any detected items.
 
Secondary Action
If scanning fails to detect a malware infection:
- If possible, disconnect the host from the network to prevent any further communication or malicious activities the malware may attempt.
 - Run RootkitBuster to check through hidden files, registry entries, processes, drivers, and hooked system services.
 - Use the Anti-Threat Toolkit (ATTK) tools to collect undetected malware information.
 - Identify and clean threats with Rescue Disk, specific to suspected threats that are persistent or difficult-to-clean. Rescue Disk allows you to use a CD, DVD, or USB drive to examine your computer without launching Microsoft Windows.
 
Did this description help? Tell us how we did.

