T1568 - Dynamic Resolution
Tattiche:
Command and Control
Command and Control
Piattaforme:
Linux macOS Windows ESXi
Linux macOS Windows ESXi
Rilevamento:
Not specified
Not specified
Description:
Adversaries may dynamically establish connections to command and control infrastructure to evade common detections and remediations. This may be achieved by using malware that shares a common algorithm with the infrastructure the adversary uses to receive the malware's communications. These calculations can be used to dynamically adjust parameters such as the domain name, IP address, or port number the malware uses for command and control.
Adversaries may use dynamic resolution for the purpose of [Fallback Channels](https://attack.mitre.org/techniques/T1008). When contact is lost with the primary command and control server malware may employ dynamic resolution as a means to reestablishing command and control.(Citation: Talos CCleanup 2017)(Citation: FireEye POSHSPY April 2017)(Citation: ESET Sednit 2017 Activity)
Adversaries may use dynamic resolution for the purpose of [Fallback Channels](https://attack.mitre.org/techniques/T1008). When contact is lost with the primary command and control server malware may employ dynamic resolution as a means to reestablishing command and control.(Citation: Talos CCleanup 2017)(Citation: FireEye POSHSPY April 2017)(Citation: ESET Sednit 2017 Activity)
Usato da Attori (6)
Malware (8)
Metadata
| MITRE ID: | T1568 |
| STIX ID: | attack-pattern--7bd9c723-2f78-... |
| Piattaforme: | Linux, macOS, Windows, ESXi |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 16:00 |