MALWARE-CNC -- Snort has detected a Comand and Control (CNC) rule violation, most likely for commands and calls for files or other stages from the control server. The alert indicates a host has been infiltrated by an attacker, who is using the host to make calls for files, as a call-home vector for other malware-infected networks, for shuttling traffic back to bot owners, etc.
MALWARE-CNC Win.Trojan.DarkVNC variant outbound connection
This rule is looking for a customized C2 payload over TCP port 443. This is not TLS traffic, but a method of sending victim PC data over the wire.
What To Look For
This rule will alert when a computer infected with DarkVNC reaches out to its command & control server using a custom protocol.
No public information
No known false positives
Cisco Talos Intelligence Group