Description
Adversaries may use a connection proxy to direct network traffic between systems or act as an intermediary for network communications to a command and control server to avoid direct connections to their infrastructure. Many tools exist that enable traffic redirection through proxies or port redirection, including [HTRAN](https://attack.mitre.org/software/S0040), ZXProxy, and ZXPortMap. (Citation: Trend Micro APT Attack Tools) Adversaries use these types of proxies to manage command and control communications, reduce the number of simultaneous outbound network connections, provide resiliency in the face of connection loss, or to ride over existing trusted communications paths between victims to avoid suspicion. Adversaries may chain together multiple proxies to further disguise the source of malicious traffic. Adversaries can also take advantage of routing schemes in Content Delivery Networks (CDNs) to proxy command and control traffic.
Threat-Mapped Scoring
ATT&CK Kill Chain Metadata
- Tactics: command-and-control
- Platforms: Linux, macOS, Windows, Network Devices, ESXi
-
Detection Guidance:
Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server or between clients that should not or often do not communicate with one another). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Analyze packet contents to detect communications that do not follow the expected protocol behavior for the port that is being used. (Citation: University of Birmingham C2) Consider monitoring for traffic to known anonymity networks (such as [Tor](https://attack.mitre.org/software/S0183)).
Malware
- Aria-body
- AuditCred
- BADCALL
- BADHATCH
- Bisonal
- Cardinal RAT
- Dridex
- FunnyDream
- GoBear
- Green Lambert
- HARDRAIN
- HOPLIGHT
- KEYPLUG
- KOCTOPUS
- Kapeka
- Kessel
- LITTLELAMB.WOOLTEA
- LunarWeb
- NETWIRE
- Neo-reGeorg
- PLEAD
- RainyDay
- RansomHub
- SDBbot
- Sagerunex
- Samurai
- Socksbot
- SombRAT
- TSCookie
- TYPEFRAME
- Ursnif
- Vasport
- WarzoneRAT
- XTunnel
- ZIPLINE
- ZxShell
- jRAT
- reGeorg