• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Malicious User Agent

Risk Factors

A user-agent string that appears in HTTP and other protocol headers can identify software running on a client. Certain types of malware that initiate post-compromise C&C communication over HTTP can be identified by a user agent (UA). Through persistent C&C communication, an attacker can remotely control a device and gain an entry point for further attacks on the network.

Kill Chain

Command-and-Control

Risk Score

83

Detection diagram
Next in Command-and-Control: Merlin C&C HTTP Connection

Attack Background

Malware can maintain communication between a victim and an attacker-controlled C&C server by sending periodic requests for instructions. The C&C server responds with tasks such as "sleep" or "run command".

C&C traffic exchanged over HTTP might include user-agent strings that can identify certain types of malware. For example, the Trickbot malware exfiltrates data to a C&C server by sending an HTTP POST request from the victim with a specific UA and exfiltrated data in the payload.

Mitigation Options

Quarantine devices to check for indicators of compromise, such as malware
Implement network segmentation, security zones, and firewall policies that limit how devices can communicate

MITRE ATT&CK ID

What else can RevealX do for you?