LoFP LoFP / t1048.003

t1048.003

TitleTags
false positives may be present if dns data exfiltration request look very similar to benign dns requests.
false positives will be present based on legitimate software, filtering may need to occur.
it's possible there can be long domain names that are legitimate.
large outbound transfers may occur due to legitimate activities such as cloud backups, file syncing, os or application updates, or developer build deployments. backup servers, ci/cd pipelines, and enterprise sync tools (e.g., onedrive, dropbox) may exhibit similar patterns. additional validation using user context, scheduled task windows, or endpoint telemetry is recommended to reduce false positives.
legitimate usage of system.net.networkinformation.ping class
legitimate usage of wget utility to post a file
network admin and normal user may send this file attachment as part of their day to day work. having a good protocol in attaching this file type to an e-mail may reduce the risk of having a spear phishing attack.
normal archive transfer via http protocol may trip this detection.
other smtp tools
some false positive could occur with some applications that change their default communication port for an added layer of obscurity.