Skip Navigation

Data loss

These indicators represent situations where the file has elements that indicate capabilities or evidence of exfiltration of data. This can include outgoing network connections, evidence of acting as a browser, or other network communications.
Indicator
Description
AbnormalNetworkActivity
The file implements a non-standard method of networking. Malware does this to avoid detection of more common networking approaches.
BrowserPluginString
The file has the capability to enumerate or install browser plugins.
ContainsBrowserString
The file contains evidence of attempting to create a custom UserAgent string. Malware frequently uses common UserAgent strings to avoid detection in outgoing requests.
DownloadFileImports
The file imports functions that can be used to download files to the system. Malware uses this as both a way to further stage an attack and to exfiltrate data via the outbound URL.
FirewallModifyImports
The file imports functions used to modify the local
Windows
firewall. Malware uses this to open holes and avoid detection.
HTTPCustomHeaders
The file contains evidence of the creation of other custom HTTP headers. Malware does this to facilitate interactions with command-and-control infrastructures and to avoid detection.
IRCCommands
The file contains evidence of interaction with an IRC server. Malware commonly uses IRC to facilitate a command-and-control infrastructure.
MemoryExfiltrationImports
The file imports functions that can be used to read memory from a running process. Malware uses this to determine proper places to insert itself, or to extract useful information from the memory of a running process, such as passwords, credit cards, or other sensitive information.
NetworkOutboundImports
The file imports functions that can be used to send data out to the network or the general Internet. Malware uses this as a method for exfiltration of data or as a method for command and control.
PipeUsage
The file imports functions that allow the manipulation of named pipes. Malware uses this as a method of communication and of data exfiltration.
RPCUsage
The file imports functions that allow it to interact with Remote Procedure Call (RPC) infrastructure. Malware uses this to spread, or to send data to remote systems for exfiltration.