Skip to content
  • There are no suggestions because the search field is empty.

NetWitness Hunting Guide - Page 7

NetWitness Hunting Guide - Appendix: Static Meta Values Continued

  • Column 1: http.lua
  • Column 2: analysis.service
  • Column 3: http three headers
  • Column 4: Sessions with three HTTP headers
  • Column 5: Attackers and malware authors try to blend in with regular network communications. Establishing interactive sessions versus mechanical sessions aids in identifying a malware behavior's bidirectional communications.

  • Column 1: http.lua
  • Column 2: analysis.service
  • Column 3: http two headers
  • Column 4: Sessions with two HTTP headers
  • Column 5: Attackers and malware authors try to blend in with regular network communications. Establishing interactive sessions versus mechanical sessions aids in identifying a malware behavior's bidirectional communications.

  • Column 1: http.lua
  • Column 2:

    analysis.service

  • Column 3:

    http uncommon origin schema

  • Column 4:

    URL from origin header does not begin with http:// or https://

  • Column 5:

    Could indicate a possible malicious redirect.


  • Column 1: http.lua
  • Column 2: analysis.service
  • Column 3: http webshell
  • Column 4: Inbound HTTP session with characteristics of webshell activity
  • Column 5: Webshells can be configured to use any of the HTTP Methods to execute commands and the commands themselves can be in HTTP headers, URL or body of a POST Method among others.

  • Column 1: http.lua
  • Column 2: analysis.service
  • Column 3: http webshell error
  • Column 4: Inbound HTTP session with characteristics of webshell activity resulting in a non-200 server response
  • Column 5: Webshells can be configured to use any of the HTTP Methods to execute commands and the commands themselves can be in HTTP headers, URL or body of a POST Method among others.

  • Column 1: http.lua
  • Column 2: analysis.service
  • Column 3: http webshell no error
  • Column 4: Inbound HTTP session with characteristics of webshell activity resulting in a 200 server response
  • Column 5: Webshells can be configured to use any of the HTTP Methods to execute commands and the commands themselves can be in HTTP headers, URL or body of a POST Method among others.

  • Column 1: http.lua
  • Column 2: analysis.service
  • Column 3: http wget direct to ip
  • Column 4: The wget application retrieving a resource from an IP address and not a hostname
  • Column 5: User agent analysis helps establish interactive sessions versus mechanical sessions and aid in identifying a malware behavior's bidirectional communications

  • Column 1: http.lua
  • Column 2: analysis.service
  • Column 3: http with base64
  • Column 4: HTTP with Base64 encoded data in the body
  • Column 5: This is a common technique to obfuscate binary or cleartext data being sent back to a command and control channel

  • Column 1: http.lua
  • Column 2: analysis.service
  • Column 3: http with binary
  • Column 4: HTTP with binary data in the body
  • Column 5: This is a common technique to obfuscate data being sent back to a command and control channel

  • Column 1: http.lua
  • Column 2: analysis.service
  • Column 3: watchlist file extension
  • Column 4: Extension watchlist
  • Column 5: These executable extensions are commonly used with malware. For example, .exe, .php, .zip

  • Column 1: http.lua
  • Column 2: analysis.service
  • Column 3: watchlist file fingerprint
  • Column 4: File type watchlist
  • Column 5: The executable file formats are commonly used in malware. For example, windows executables and JARs

  • Column 1:

    http.lua

  • Column 2: analysis.service
  • Column 3:

    websocket

  • Column 4:

    Websocket session

  • Column 5:

    Some customers need to examine websocket traffic.


  • Column 1:

    http.lua

  • Column 2:

    ioc

  • Column 3:

    apache struts CVE-2017-12611 attempt

  • Column 4:

    The vulnerability is due to the unsafe use of writable expression values in Freemarker content that is processed by the affected application.

  • Column 5:

    Remote code execution allows an attacker to gain access to and control the victim machine.


  • Column 1:

    http.lua

  • Column 2:

    ioc

  • Column 3:

    apache struts exploit attempt

  • Column 4:

    An attempt to exploit Apache Struts vulnerability CVE-2017-5638 has been detected.

  • Column 5: Remote code execution allows an attacker to gain access to and control the victim machine.

  • Column 1: http.lua
  • Column 2: ioc
  • Column 3: apt ActiveMonk UA
  • Column 4: Known bad user-agent local string match, "Mozilla/4%.0 (compatible; MSIE 6%.0; Windows NT 5%.1; SV1; Maxthon; TERA"
  • Column 5: Advanced threat actor campaigns use similar tools, techniques and procedures. The presence of known APT IoCs is indicative of compromise

  • Column 1: http.lua
  • Column 2: ioc
  • Column 3: apt Deep Panda C2
  • Column 4: Known Threat Actor "'Deep Panda" Command and Control indicators of compromise
  • Column 5: Advanced threat actor campaigns use similar tools, techniques and procedures. The presence of APT-indicators of compromise is indicative of active compromise

  • Column 1: http.lua
  • Column 2: ioc
  • Column 3: apt Foxy RAT
  • Column 4: Foxy remote access trojan indicator of compromise
  • Column 5: Advanced threat actor campaigns use similar tools, techniques and procedures. The presence of known APT IoCs is indicative of compromise

  • Column 1: http.lua
  • Column 2: ioc
  • Column 3: apt Lurid RAT
  • Column 4: Lurid remote access trojan indicator of compromise
  • Column 5: Advanced threat actor campaigns use similar tools, techniques and procedures. The presence of APT-indicators of compromise is indicative of active compromise

  • Column 1: http.lua
  • Column 2: ioc
  • Column 3: apt MiniASP
  • Column 4: MiniASP remote access trojan indicator of compromise
  • Column 5: Advanced threat actor campaigns use similar tools, techniques and procedures. The presence of APT-indicators of compromise is indicative of active compromise

  • Column 1: http.lua
  • Column 2: ioc
  • Column 3: apt NetTravler RAT
  • Column 4: NetTraveler remote access trojan indicator of compromise
  • Column 5: Advanced threat actor campaigns use similar tools, techniques and procedures. The presence of known APT IoCs is indicative of compromise

  • Column 1: http.lua
  • Column 2: ioc
  • Column 3: apt NFlog Rat
  • Column 4: Known bad user-agent indicator. User-agent local string, "www"
  • Column 5: Advanced threat actor campaigns use similar tools, techniques and procedures. The presence of known APT IoCs is indicative of compromise

  • Column 1: http.lua
  • Column 2: ioc
  • Column 3: apt NFlog Rat
  • Column 4: NFLog remote access trojan indicator of compromise
  • Column 5: Advanced threat actor camp , , techniques and procedures. The presence of known APT IoCs is indicative of compromise

  • Column 1: http.lua
  • Column 2: ioc
  • Column 3: apt PhotoASP RAT
  • Column 4: Known bad user-agent local string match ("Mozilla/4.0") paired with no referrer and a filename of "PHOTO.ASP"
  • Column 5: Advanced threat actor campaigns use similar tools, techniques and procedures. The presence of known APT IoCs is indicative of compromise

  • Column 1: http.lua
  • Column 2: ioc
  • Column 3: apt PNG Rat
  • Column 4: Known bad user-agent indicator. User-agent local string, "Windows+NT+5.1"
  • Column 5: Advanced threat actor campaigns use similar tools, techniques and procedures. The presence of known APT IoCs is indicative of compromise

  • Column 1: http.lua
  • Column 2: ioc
  • Column 3: apt Sykipot Rat
  • Column 4: Known bad user-agent indicator. User-agent local string, "HTTP-GET"
  • Column 5: Advanced threat actor campaigns use similar tools, techniques and procedures. The presence of known APT IoCs is indicative of compromise

  • Column 1: http.lua
  • Column 2: ioc
  • Column 3: apt WebC2 CS
  • Column 4: Known bad user-agent local string match ("Win32") coupled with and a unique query identifier
  • Column 5: Advanced threat actor campaigns use similar tools, techniques and procedures. The presence of known APT IoCs is indicative of compromise

  • Column 1: http.lua
  • Column 2: ioc
  • Column 3: apt ZipToken UA Post
  • Column 4: Known bad user-agent local string match ("HttpBrowser/1.0")coupled with POST method
  • Column 5: Advanced threat actor campaigns use similar tools, techniques and procedures. The presence of known APT IoCs is indicative of compromise

  • Column 1: http.lua
  • Column 2: ioc
  • Column 3: Crimeware Black Hole Exploit Kit
  • Column 4: Black Hole exploit kit indicator of compromise
  • Column 5: The presence of an exploit kit is indicative of potential compromise

  • Column 1: http.lua
  • Column 2: ioc
  • Column 3: Crimeware Zeus
  • Column 4: Zeus indicators of compromise
  • Column 5: The presence of crimeware is indicative of active infection

  • Column 1: http.lua
  • Column 2: ioc
  • Column 3: Crimeware Zeus Knownbad
  • Column 4: Known Zeus indicators of compromise
  • Column 5: The presence of crimeware is indicative of active infection

  • Column 1: http.lua
  • Column 2: ioc
  • Column 3: http tunnel rat
  • Column 4: HTTP Tunnel remote access trojan indicator of compromise
  • Column 5: The presence of a remote access trojan is indicative of active compromise

  • Column 1: http.lua
  • Column 2: ioc
  • Column 3: java exe
  • Column 4: Outbound Java Virtual Machine web requests for a windows executable
  • Column 5: The Java Virtual Machine is a popular vector for malware delivery. All outbound JVM and GET methods should be analyzed.

  • Column 1: http.lua
  • Column 2: ioc
  • Column 3: java pdf
  • Column 4: Outbound Java Virtual Machine web requests for a PDF file
  • Column 5: The Java Virtual Machine is a popular vector for malware delivery. All outbound JVM and GET methods should be analyzed.

  • Column 1: http.lua
  • Column 2: ioc
  • Column 3: Known Bad File Name
  • Column 4: Known bad filename watchlist
  • Column 5: Malicious filenames used in previous attack campaigns that can be indicative of active compromise

  • Column 1: http.lua
  • Column 2: ioc
  • Column 3: Known Bad UA CredentialLeak
  • Column 4: Known bad user-agent indicator. User-agent local string , , , , , , , , ,