Communication with suspicious random domain name (Preview)

Copper Contributor

Hi All

 

So we are seeing multiple alerts via Azure Security Centre for the following

 

Communication with suspicious random domain name (Preview)

 

The alerts show that various assets connected to our domain are querying via our DNS server various nefarious looking domain names such as 25jimj.qgxouyclggk.com and 3dde4b.zbrjtstrclnm.com

 

In all of these cases we can see that the asset has connected to various IP addresses that are registered to amazon. We seee multiple hits to amazon and then we see hits to these random domains.

 

The alert points us to the following 

 

https://interflowwebportalext.trafficmanager.net/reports/DisplayReport?callerIdentity=ddd5443d-e6f4-...

 

We run virus scans on these machines and no malware or issues are being reported.

 

This alert is in preview so very little online about the alert itself. 

 

Does anyone on here know much about this alert? 

 

How concerned should we be?

 

These assets themselves are onboarded onto Defender but this activity does not trigger any alert.

 

 

5 Replies

@ragnar667 We're seeing these as well; I believe that the requests come from Chrome (or a Chromium-based browser) checking for ISP DNS interception at startup.  (See https://mikewest.org/2012/02/chrome-connects-to-three-random-domains-at-startup/.)  You'll probably see www.[random].com plus one request for each search domain.  This is benign, but unfortunately causes near 100% false-positives.

Hey @ragnar667 

 

FYI, the SOA (start of authority) on the DNS record for zbrjtstrclnm.com points to zoneadmin.tonic.com.

 

Tonic.com is a pay-per-click style advertising company and the domain is likely related to their traffic.

 

Thanks

We received a Sentinel alert for this URL: 6c3140.bwtjgtbsgvqqwg.com
When searching through our proxy logs, the full URL ended up being:

hxxp://6c3140.bwtjgtbsgvqqwg.com/?subid1=21477459&subid2=3573470005&subid3=1243549---delimjuwe---sevenwestmedia-perthnow&subid4=taboola-GiB2UOqOvlnWOKVbRBPFc7raGEbeQ83ZYqNnmIQY_wDR-yCWt1sokI-hip-FupLnAQ&network=taboola&site=sevenwestmedia-perthnow&adtitle=Unsold+Womans+Shoes+Almost+Being+Given+Away&click_id=GiB2UOqOvlnWOKVbRBPFc7raGEbeQ83ZYqNnmIQY_wDR-yCWt1sokI-hip-FupLnAQ&dpco=1&tblci=GiB2UOqOvlnWOKVbRBPFc7raGEbeQ83ZYqNnmIQY_wDR-yCWt1sokI-hip-FupLnAQ 

Looking at some of the keywords, Perthnow is a local news website operated by a tabloid newspaper. Taboola is a public advertising company. Therefore, I believe these alerts are less about DNS assistance, and more web based advertising as highlighted by @Tun33elrt

@RichardH01 I think the advertisers are using randomized domain names for the same reason the malware was: to make it harder to block the traffic.

To continue this journey, I concur with @Tun33elrt as I got a similar result, but used a different process.
1. My random site is 6867bb.shcxjdwfblvm.com
2. Wheregoes.com shows a 307 temporary redirection to unsold-cars-93562.com
3. I tried the mxToolbox SOA tool, but it doesn't show zoneadmin.tonic.com
4. Entering "unsold-cars-93562.com" at bgp.he.net, I eventually got the zoneadmin.tonic.com mname record

Hope this helps