Executive Summary

Our security team recently investigated recurring DNS query alerts for the domain epicunitscan[.]info, initially detected via mSOCTM custom built IDS network based signatures. The mSOCTM team has been tracking requests to this domain[1] for years, even though it does not resolve to an IP address (as of 07/28/2025[2]).

Search engine results showing this domain is associated with virus activity, as reported by other sites.

Network based alerts or alerts on DNS logs can identify malfeasant DNS queries, however when the DNS query fails to resolve, the Endpoint Detection and Response systems will not log the request. Therefore, an investigation using EDR data alone may result in a false negative (an issue is occurring but the data does not show artifacts).

The follow details a case study of using existing tools, identifying root cause and advising the customer of how home based systems were causing a re-infection of a work computer.

DNS Request Investigation Challenges

A device on a network that uses DHCP (Dynamic Host Configuration Protocol) may have its source IP address change over time, particularly when its DHCP lease expires or it moves to a different part of the network. The DHCP server dynamically assigns IP addresses to devices, and these addresses can be periodically renewed, released, or reassigned to other clients, resulting in a changing association between network devices and their IP addresses.

Alerting on DNS requests flowing across the network will typically show the source IP in the log. However, sometimes that source IP is a DHCP or another DNS server. Let me explain.

When a DNS request is observed on the network, the recorded source IP address may not accurately represent the true origin of the request if the DNS query was forwarded by another DNS server. In this scenario, the network may only capture the address of the intermediary DNS server that relayed the request, rather than the original client.

These two conditions—changing DHCP source IPs and DNS queries forwarded by intermediate servers—pose significant challenges for network monitoring and forensic analysis, as they can obscure the true source of DNS requests and frustrate efforts to attribute specific network actions to individual devices

Why the Endpoint Detection and Response Will Not Log this DNS Request

Endpoint Detection and Response (EDR) solutions do not typically log all network activity at the same level of detail as full network packet capture tools. Instead, EDRs focus on selected types of network telemetry and protocols that are most relevant for detecting and investigating endpoint-related threats. These usually include TCP and UDP, though some EDRs log more.

As a result, while the alarm will trigger and the request was made, attempts to correlate this to the EDR logs will fail. This is because the API call to Windows for DNS resolution is not what is logged by the EDR, however it is maintained in the DNS cache – known as Negative Caching.

While EDR will not log this request, network traffic on DNS and DNS logs will. See below:

Screenshot of an event log showing DNS query details, including source and destination IP addresses, query type, and response code.

How to Use Negative Caching to Investigate

In this case study, the mSOC team uses tools like OSQuery, which enables enterprise wide queries for data on endpoints. osquery is an open-source endpoint monitoring and instrumentation tool that allows you to explore operating system data using SQL-like queries.

An example query is below, though you can also collect all available DNS cache entries and search those.

SELECT name, type FROM dns_cache WHERE name LIKE '%epicunitscan%';
Screenshot of a DNS cache query result showing matched response for domain epicunitscan.info with device and timestamp details.

Why this worked

Typical Response & Recurrence

A typical response to this type of persistent suspicious request is to reimage the computer system. Some organizations may chose to clear out browser cache, javascript, reset browser settings etc..

However, after reimage, the connections re-occurred. This was not surprising given what we suspected and our experience for root cause in this issue.

Root Cause Identification

Resolution Steps

To fully eradicate the threat:

  1. Backup & Isolate:
    • Export bookmarks via Chrome’s Bookmark Manager (Ctrl+Shift+O → Export).
    • Note installed extensions for manual reinstallation later.
  2. Uninstall and Purge Chrome:
    • Uninstall Chrome.Delete the Chrome user data folder:
    • Remove-Item -Recurse -Force “$env:LOCALAPPDATA\Google\Chrome”
    • Clean registry entries
      Remove-Item -Path “HKLM:\Software\Wow6432Node\Google\Chrome” -Recurse 
  3. Reset Chrome Sync:
  4. Reinstall Chrome Securely:

Key Takeaways

This incident underscores the need for layered defense: combining network IDS (Snort), endpoint tools, and manual forensic techniques to combat persistent threats.


[1] https://www.bleepingcomputer.com/forums/t/567607/epicunitscaninfo-need-help-to-remove/

[2] https://dnschecker.org/all-dns-records-of-domain.php?query=epicunitscan.info&rtype=ALL&dns=google

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Discover more from mSOC.io | Managed Security Operations Center

Subscribe now to keep reading and get access to the full archive.

Continue reading