T1102.001

Dead Drop Resolver

Adversaries may use an existing, legitimate external Web service to host information that points to additional command and control (C2) infrastructure. Adversaries post content (dead drop resolvers) on services like Pastebin, GitHub, Twitter, Google Docs, YouTube, or Microsoft TechNet with embedded and often obfuscated or encoded domains or IP addresses. Infected victims reach out to these resolvers to obtain real C2 server addresses, allowing attackers to change infrastructure dynamically while hiding behind trusted domains. This technique leverages the legitimacy and SSL/TLS encryption of popular web services to blend into normal network traffic and protect back-end C2 infrastructure from discovery through malware binary analysis.

Microsoft Sentinel / Defender
kusto
let DeadDropDomains = dynamic([
  "pastebin.com", "pastebin.pl", "paste.ee", "hastebin.com",
  "github.com", "raw.githubusercontent.com", "gist.github.com",
  "twitter.com", "api.twitter.com", "t.co",
  "docs.google.com", "drive.google.com", "sites.google.com",
  "youtube.com", "youtu.be",
  "technet.microsoft.com", "social.technet.microsoft.com",
  "livejournal.com",
  "imgur.com", "i.imgur.com",
  "reddit.com", "old.reddit.com",
  "cloudflare.com", "workers.dev",
  "amazonaws.com", "s3.amazonaws.com",
  "onedrive.live.com", "sharepoint.com",
  "notion.so", "trello.com",
  "discord.com", "discordapp.com",
  "telegram.org", "t.me"
]);
let SuspiciousProcesses = dynamic([
  "powershell.exe", "pwsh.exe", "cmd.exe", "wscript.exe", "cscript.exe",
  "mshta.exe", "rundll32.exe", "regsvr32.exe", "certutil.exe",
  "curl.exe", "wget.exe", "bitsadmin.exe"
]);
DeviceNetworkEvents
| where Timestamp > ago(24h)
| where RemoteUrl has_any (DeadDropDomains)
| where InitiatingProcessFileName in~ (SuspiciousProcesses)
    or (InitiatingProcessFileName !in~ ("chrome.exe", "msedge.exe", "firefox.exe", "iexplore.exe", "opera.exe", "brave.exe", "safari.exe", "outlook.exe", "teams.exe", "slack.exe", "onedrive.exe", "dropbox.exe", "svchost.exe"))
| extend IsKnownBrowser = InitiatingProcessFileName in~ ("chrome.exe", "msedge.exe", "firefox.exe", "iexplore.exe", "opera.exe", "brave.exe")
| extend IsSuspiciousProcess = InitiatingProcessFileName in~ (SuspiciousProcesses)
| extend PastebinAccess = RemoteUrl has_any ("pastebin.com", "pastebin.pl", "paste.ee", "hastebin.com")
| extend GitHubRawAccess = RemoteUrl has_any ("raw.githubusercontent.com", "gist.github.com")
| extend SocialMediaAccess = RemoteUrl has_any ("twitter.com", "api.twitter.com", "reddit.com")
| extend CloudStorageAccess = RemoteUrl has_any ("amazonaws.com", "onedrive.live.com", "sharepoint.com", "docs.google.com", "drive.google.com")
| project Timestamp, DeviceName, AccountName,
         InitiatingProcessFileName, InitiatingProcessCommandLine,
         InitiatingProcessParentFileName,
         RemoteUrl, RemoteIP, RemotePort, RemoteIPType,
         IsKnownBrowser, IsSuspiciousProcess,
         PastebinAccess, GitHubRawAccess, SocialMediaAccess, CloudStorageAccess
| sort by Timestamp desc
high severity medium confidence

Data Sources

Network Traffic: Network Connection Creation Microsoft Defender for Endpoint DeviceNetworkEvents

Required Tables

DeviceNetworkEvents

False Positives

  • Legitimate developer tooling (git clients, CI/CD agents, IDEs) making programmatic requests to GitHub APIs or raw content URLs
  • Software update mechanisms or package managers (npm, pip, Chocolatey) resolving dependencies from GitHub or cloud storage
  • IT automation scripts (Ansible, Chef, Puppet, Terraform) using PowerShell or cmd.exe to fetch configuration data from cloud services like S3 or SharePoint
  • Security monitoring agents or vulnerability scanners that fetch IOC feeds or configuration from Pastebin-like services
  • Corporate applications that legitimately integrate with Google Drive, SharePoint, or OneDrive using background service processes

Unlock Pro Content

Get the full detection package for T1102.001 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections