title: Bitsadmin to Uncommon TLD id: 9eb68894-7476-4cd6-8752-23b51f5883a7 status: experimental description: Detects Bitsadmin connections to domains with uncommon TLDs - https://twitter.com/jhencinski/status/1102695118455349248 - https://isc.sans.edu/forums/diary/Investigating+Microsoft+BITS+Activity/23281/ author: Florian Roth date: 2019/03/07 modified: 2020/09/03 logsource: category: proxy detection: selection: c-useragent: - 'Microsoft BITS/*' falsepositives: r-dns: - '*.com' - '*.net' - '*.org' condition: selection and not falsepositives fields: - ClientIP - c-uri - c-useragent falsepositives: - Rare programs that use Bitsadmin and update from regional TLDs e.g. .uk or .ca level: high tags: - attack.command_and_control - attack.t1071.001 - attack.defense_evasion - attack.persistence - attack.t1197 - attack.s0190