Data loss

These indicators represent situations where the file has elements that indicate capabilities or evidence of exfiltration of data. This can include outgoing network connections, evidence of acting as a browser, or other network communications.

Indicator

Description

AbnormalNetworkActivity

The file implements a non-standard method of networking. Malware does this to avoid detection of more common networking approaches.

BrowserPluginString

The file has the capability to enumerate or install browser plugins.

ContainsBrowserString

The file contains evidence of attempting to create a custom UserAgent string. Malware frequently uses common UserAgent strings to avoid detection in outgoing requests.

DownloadFileImports

The file imports functions that can be used to download files to the system. Malware uses this as both a way to further stage an attack and to exfiltrate data via the outbound URL.

FirewallModifyImports

The file imports functions used to modify the local Windows firewall. Malware uses this to open holes and avoid detection.

HTTPCustomHeaders

The file contains evidence of the creation of other custom HTTP headers. Malware does this to facilitate interactions with command-and-control infrastructures and to avoid detection.

IRCCommands

The file contains evidence of interaction with an IRC server. Malware commonly uses IRC to facilitate a command-and-control infrastructure.

MemoryExfiltrationImports

The file imports functions that can be used to read memory from a running process. Malware uses this to determine proper places to insert itself, or to extract useful information from the memory of a running process, such as passwords, credit cards, or other sensitive information.

NetworkOutboundImports

The file imports functions that can be used to send data out to the network or the general Internet. Malware uses this as a method for exfiltration of data or as a method for command and control.

PipeUsage

The file imports functions that allow the manipulation of named pipes. Malware uses this as a method of communication and of data exfiltration.

RPCUsage

The file imports functions that allow it to interact with Remote Procedure Call (RPC) infrastructure. Malware uses this to spread, or to send data to remote systems for exfiltration.