Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

C2/Generic-A

Hi,

Today I our UTM Advenced Threat Protection shows C2/Generic-A drop. the logs has the IP of our DNS server. I did download the  Sophos Virus Removal Tool on the DNS server and run it and it came up clean.

I did enable the DNS debug and find out a host in our network try to access the clonyjohn.com.

Should we also run the Virus Removal Tool on this host as well? Our own Mcafee AV did not come up with any virus.

Thanks



This thread was automatically locked due to age.
Parents Reply
  • Hi Aresh,

    have a look here https://docs.microsoft.com/de-de/archive/blogs/motiba/process-monitor-for-dynamic-malware-analysis

    I think that part is a Good start:

    Included Filters:

    ·        TCP/UDP Send and Receive - any connections that malware may try to use while it’s running

    ·        Load Image – DLL/Executable loading

    ·        Create File – new files being created

    ·        Write/ Delete/Rename File – any changes to files

    ·        Registry activities – Run entries used for malware persistence

    Then, I've excluded noisy events that are usually not relevant for malware analyses:

    Excluded Filters:

    ·        Procmon/Procmon64/Autoruns/Sysmon : These will exclude any events related to the Sysinternals tools

    ·        Disposition: Open – used to filter any call for create file used to open a file rather than actually creating a file (See here: msdn.microsoft.com/.../aa363858(v=vs.85).aspx)

    ·        Page File – In my opinion, the page file is less/not relevant when doing malware analysis

     

    Best regards 

    Alex 

    -

Children