Dynamic Resolution
Adversaries may dynamically establish connections to command and control infrastructure to evade common detections and remediations. This may be achieved by using malware that shares a common algorithm with the infrastructure the adversary uses to receive the malware's communications. These calculations can be used to dynamically adjust parameters such as the domain name, IP address, or port number the malware uses for command and control. Adversaries may use dynamic resolution for the purpose ...
BY SOURCE
PROCEDURES (8)
Auto-extracted: 2 detections for beacon
Auto-extracted: 2 detections for dns
Auto-extracted: 1 detections for download
Auto-extracted: 1 detections for dns
Auto-extracted: 1 detections for download
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for c2
Auto-extracted: 1 detections for c2