title: DNS TXT Answer with Possible Execution Strings id: 8ae51330-899c-4641-8125-e39f2e07da72 status: experimental description: Detects strings used in command execution in DNS TXT Answer author: Markus Neis date: 2018/08/08 modified: 2020/08/27 references: - https://twitter.com/stvemillertime/status/1024707932447854592 - https://github.com/samratashok/nishang/blob/master/Backdoors/DNS_TXT_Pwnage.ps1 logsource: category: dns detection: selection: record_type: 'TXT' answer: - '*IEX*' - '*Invoke-Expression*' - '*cmd.exe*' condition: selection falsepositives: - Unknown level: high tags: - attack.command_and_control - attack.t1071 # an old one - attack.t1071.004