Data loss
These indicators represent situations where the file has elements that indicate capabilities or evidence of exfiltration of data. This can include outgoing network connections, evidence of acting as a browser, or other network communications.
|
Indicator |
Description |
|---|---|
|
AbnormalNetworkActivity |
The file implements a non-standard method of networking. Malware does this to avoid detection of more common networking approaches. |
|
BrowserPluginString |
The file has the capability to enumerate or install browser plugins. |
|
ContainsBrowserString |
The file contains evidence of attempting to create a custom UserAgent string. Malware frequently uses common UserAgent strings to avoid detection in outgoing requests. |
|
DownloadFileImports |
The file imports functions that can be used to download files to the system. Malware uses this as both a way to further stage an attack and to exfiltrate data via the outbound URL. |
|
FirewallModifyImports |
The file imports functions used to modify the local Windows firewall. Malware uses this to open holes and avoid detection. |
|
HTTPCustomHeaders |
The file contains evidence of the creation of other custom HTTP headers. Malware does this to facilitate interactions with command-and-control infrastructures and to avoid detection. |
|
IRCCommands |
The file contains evidence of interaction with an IRC server. Malware commonly uses IRC to facilitate a command-and-control infrastructure. |
|
MemoryExfiltrationImports |
The file imports functions that can be used to read memory from a running process. Malware uses this to determine proper places to insert itself, or to extract useful information from the memory of a running process, such as passwords, credit cards, or other sensitive information. |
|
NetworkOutboundImports |
The file imports functions that can be used to send data out to the network or the general Internet. Malware uses this as a method for exfiltration of data or as a method for command and control. |
|
PipeUsage |
The file imports functions that allow the manipulation of named pipes. Malware uses this as a method of communication and of data exfiltration. |
|
RPCUsage |
The file imports functions that allow it to interact with Remote Procedure Call (RPC) infrastructure. Malware uses this to spread, or to send data to remote systems for exfiltration. |