DDI RULE 4923
Publish Date: 16 de октября de 2024
DESCRIPTION NAME:
Splashtop Business Access Remote Desktop RMM - DNS (Response)
CONFIDENCE LEVEL: LOW
SEVERITY INBOUND:
SEVERITY OUTBOUND:
informational
Low
Medium
High
OVERVIEW
This is Trend Micro detection for packets passing through DNS network protocols that manifests Suspicious Traffic activities which can be a potential intrusion. Below are some indicators of unusual behavior:
- Suspicious activity in administrator or privileged accounts
- Dubious logins, access, and other network activities that indicate probing or brute force attacks
- Anomalous spike of requests
- Network traffic that traverses in unusually used ports
- Unknown files, applications, and processes in the system
- Unusual traffic going in and out of the network
- Unusual message or file structure
TECHNICAL DETAILS
Attack Phase: Lateral Movement
Protocol: DNS
Risk Type: OTHERS
(Note: OTHERS can be network connections related to hacking attempts, exploits, connections done by grayware, or suspicious traffic.)
Threat Type: Suspicious Behavior
Confidence Level: Low
Severity: Low(Inbound)| Low(Outbound)
DDI Default Rule Status: Enable
Event Class: Suspicious Traffic
Event Sub Class: DNS
Behavior Indicator: Suspicious Traffic
APT Related: NO
SOLUTION
Network Content Inspection Pattern Version: 1.15603.00
Network Content Inspection Pattern Release Date: 05 Mar 2024
Network Content Correlation Pattern Version: 1.15377.00
Network Content Correlation Pattern Release Date: 27 Feb 2024
Immediate Action
- Update your Trend Micro products and pattern files to the latest version.
- Scan the host exhibiting this type of network behavior to clean any detected items.
Secondary Action
If scanning fails to detect a malware infection:
- If possible, disconnect the host from the network to prevent any further communication or malicious activities the malware may attempt.
- Run RootkitBuster to check through hidden files, registry entries, processes, drivers, and hooked system services.
- Use the Anti-Threat Toolkit (ATTK) tools to collect undetected malware information.
- Identify and clean threats with Rescue Disk, specific to suspected threats that are persistent or difficult-to-clean. Rescue Disk allows you to use a CD, DVD, or USB drive to examine your computer without launching Microsoft Windows.
Did this description help? Tell us how we did.