T1568 Dynamic Resolution

Adversaries may dynamically establish connections to command and control infrastructure to evade common detections and remediations. This may be achieved by using malware that shares a common algorithm with the infrastructure the adversary uses to receive the malware's communications. These calculations can be used to dynamically adjust parameters such as the domain name, IP address, or port number the malware uses for command and control.

Adversaries may use dynamic resolution for the purpose of Fallback Channels. When contact is lost with the primary command and control server malware may employ dynamic resolution as a means to reestablishing command and control.(Citation: Talos CCleanup 2017)(Citation: FireEye POSHSPY April 2017)(Citation: ESET Sednit 2017 Activity)

View in MITRE ATT&CK®

CRI Profile Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
DE.AE-02.01 Event analysis and detection Mitigates T1568 Dynamic Resolution
Comments
This diagnostic statement provides for implementation of methods to block similar future attacks via security tools such as antivirus and IDS/IPS to provide protection against threats and exploitation attempts.
References
    DE.CM-01.01 Intrusion detection and prevention Mitigates T1568 Dynamic Resolution
    Comments
    Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some obfuscation (command and control) activity at the network level.
    References
      PR.IR-01.03 Network communications integrity and availability Mitigates T1568 Dynamic Resolution
      Comments
      This diagnostic statement protects against Dynamic Resolution through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
      References

        NIST 800-53 Mappings

        Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
        CA-07 Continuous Monitoring mitigates T1568 Dynamic Resolution
        SC-21 Secure Name/Address Resolution Service (Recursive or Caching Resolver) mitigates T1568 Dynamic Resolution
        SC-22 Architecture and Provisioning for Name/Address Resolution Service mitigates T1568 Dynamic Resolution
        SC-20 Secure Name/Address Resolution Service (Authoritative Source) mitigates T1568 Dynamic Resolution
        SI-03 Malicious Code Protection mitigates T1568 Dynamic Resolution
        SI-04 System Monitoring mitigates T1568 Dynamic Resolution
        AC-04 Information Flow Enforcement mitigates T1568 Dynamic Resolution
        SC-07 Boundary Protection mitigates T1568 Dynamic Resolution

        Azure Mappings

        Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
        alerts_for_dns Alerts for DNS technique_scores T1568 Dynamic Resolution
        Comments
        Can identify "random" DNS occurences which can be associated with domain generation algorithm or Fast Flux sub-techniques. Partial for coverage and accuracy (potential for false positive/benign).
        References
        azure_dns_analytics Azure DNS Analytics technique_scores T1568 Dynamic Resolution
        Comments
        This control can be used for after-the-fact analysis of potential fast-flux DNS C2
        References

        AWS Mappings

        Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
        amazon_guardduty Amazon GuardDuty technique_scores T1568 Dynamic Resolution
        Comments
        GuardDuty has the following finding types to flag events where adversaries may dynamically establish connections to command-and-control infrastructure to evade common detections and remediations. Trojan:EC2/DGADomainRequest.B Trojan:EC2/DGADomainRequest.C!DNS
        References

        ATT&CK Subtechniques

        Technique ID Technique Name Number of Mappings
        T1568.002 Domain Generation Algorithms 17
        T1568.001 Fast Flux DNS 5
        T1568.003 DNS Calculation 3