Skip to content

Latest commit

 

History

History
54 lines (42 loc) · 2.21 KB

domain-name-generation.md

File metadata and controls

54 lines (42 loc) · 2.21 KB
ID B0031
Objective(s) Command and Control
Related ATT&CK Techniques Dynamic Resolution: Domain Generation Algorithms (T1568.002)
Version 2.0
Created 1 August 2019
Last Modified 21 November 2022

Domain Name Generation

Malware generates the domain name of the controller to which it connects. Access to on the fly domains enables C2 to operate as domains and IP addresses are blocked. The algorithm can be complicated in more advanced implants; understanding the details so that names can be predicted can be useful in mitigation and response. [1]

The related Dynamic Resolution: Domain Generation Algorithms (T1568.002) ATT&CK sub-technique (oriented toward an adversary perspective with examples that include malware) was defined subsequent to this MBC behavior.

Use in Malware

Name Date Method Description
Kraken April 2008 -- Kraken uses a domain generating algorithm to provide new domains. [2]
Conficker November 2008 -- Conficker uses a domain name generator. [3]
CryptoLocker 2013 -- The malware sends a hash value generated from system information [[4]](#4
Ursnif 2016 -- Ursnif has used a Domain name generation algorithm in the past [5]

References

[1] https://blog.malwarebytes.com/security-world/2016/12/explained-domain-generating-algorithm/

[2] http://blog.threatexpert.com/2008/04/kraken-changes-tactics.html

[3] https://en.wikipedia.org/wiki/Conficker

[4] https://www.secureworks.com/research/cryptolocker-ransomware

[5] https://www.proofpoint.com/us/threat-insight/post/ursnif-variant-dreambot-adds-tor-functionality