Query Details
# Detect malware communication using SSL inspection
## Description
Recently updated Zeek network layer signals for MDE with SSL inspection offer new detection and hunting possibilities. As some malware use common, default or re-used certificates, the following query could help detect AsyncRAT, Cobalt Strike, QuasarRAT, Laplas Clipper, DcRAT, VenomRAT, BitRAT and Mythic C2.
### References
- https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/enrich-your-advanced-hunting-experience-using-network-layer/ba-p/3794693
- https://sslbl.abuse.ch/ssl-certificates/
- https://embee-research.ghost.io/shodan-censys-queries/
### Microsoft 365 Defender & Microsoft Sentinel
```
DeviceNetworkEvents
// Define timeframe
| where Timestamp > ago(30d)
| where ActionType == "SslConnectionInspected"
| extend AdditionalFields = todynamic(AdditionalFields)
| extend issuer = tostring(AdditionalFields.issuer), subject = tostring(AdditionalFields.subject), direction = tostring(AdditionalFields.direction)
| where direction == "Out" and not(ipv4_is_private(RemoteIP))
// Define issuer and subject parameters
| where AdditionalFields.issuer has_any ("AsyncRAT Server", "Major Cobalt Strike" "Laplas.app") or AdditionalFields.subject has_any ("AsyncRAT Server", "Major Cobalt Strike", "Quasar Server CA", "Laplas.app", "Mythic", "DcRat", "VenomRAT", "BitRAT")
| sort by Timestamp desc
```
### Versioning
| Version | Date | Comments |
| ------------- |---------------| ---------------------------------------|
| 1.0 | 13/07/2022 | Initial publish |
The query is designed to detect malware communication using SSL inspection. It looks for specific certificates commonly used by malware such as AsyncRAT, Cobalt Strike, QuasarRAT, Laplas Clipper, DcRAT, VenomRAT, BitRAT, and Mythic C2. The query filters network events based on SSL connections that have been inspected and checks the issuer and subject fields of the SSL certificates. It also excludes private IP addresses and sorts the results by timestamp.

Michalis Michalos
Released: August 14, 2023
Tables
Keywords
Operators