Skip to content

DET0011 Detecting Junk Data in C2 Channels via Behavioral Analysis

Item Value
ID DET0011
Version 1.0
Created 21 October 2025
Last Modified 21 October 2025

Technique Detected: T1001.001 (Junk Data)

Analytics

Windows

AN0030

Processes generating large outbound connections with disproportionate send/receive ratios, often to uncommon ports or hosts, potentially inserting meaningless data into protocol payloads.

Log Sources
Data Component Name Channel
Network Connection Creation (DC0082) WinEventLog:Sysmon EventCode=3, 22
Process Access (DC0035) WinEventLog:Sysmon EventCode=10
Network Traffic Content (DC0085) NSM:Flow TCP/UDP
Mutable Elements
Field Description
PayloadEntropyThreshold Tunable threshold for Shannon entropy of network payloads.
TimeWindow Duration of outbound data transfer to evaluate disproportionate upload size.
UserContext Filter based on user accounts allowed to generate outbound traffic.

Linux

AN0031

Outbound traffic with anomalous payload sizes and patterns from non-networking processes, often observed via packet inspection or connection logs.

Log Sources
Data Component Name Channel
Process Creation (DC0032) auditd:SYSCALL execve network tools
Network Traffic Content (DC0085) NSM:Flow TCP session tracking
Mutable Elements
Field Description
EntropyScore Adjust based on expected entropy of typical outbound data.
ProcessWhitelist Exclude known good binaries that generate high network output.
DataRatioThreshold Minimum ratio of bytes_sent to bytes_received.

macOS

AN0032

Previously unseen applications generating outbound connections with atypical data flow characteristics, such as excessive data with no return response.

Log Sources
Data Component Name Channel
Network Connection Creation (DC0082) macos:unifiedlog connection attempts
Process Creation (DC0032) macos:osquery process_events
Network Traffic Content (DC0085) NSM:Flow session behavior
Mutable Elements
Field Description
ParentProcessCheck Allow filtering based on parent-child relationship for benign services.
HostWhitelist Known legitimate C2-like patterns (e.g., Apple telemetry).

ESXi

AN0033

Anomalous traffic from ESXi host management daemons (like hostd or vpxa) embedding non-standard payloads in management protocols (e.g., HTTPS) or beaconing behavior.

Log Sources
Data Component Name Channel
Network Traffic Content (DC0085) esxi:vmkernel Network activity
Network Connection Creation (DC0082) esxi:hostd System service interactions
Mutable Elements
Field Description
TLSFingerprintMismatch Detects mismatched TLS client behavior vs expected for hostd/vpxa.
UnusualDestinationPorts Highlight traffic from ESXi hosts to uncommon ports outside vCenter ranges.