Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ references:
- https://news.sophos.com/en-us/2021/11/11/bazarloader-call-me-back-attack-abuses-windows-10-apps-mechanism/
author: Nasreddine Bencherchali (Nextron Systems)
date: 2023-01-11
modified: 2024-08-22
modified: 2025-08-01
tags:
- attack.defense-evasion
logsource:
Expand All @@ -21,8 +21,11 @@ detection:
EventID: 854
Path|contains:
- '.githubusercontent.com' # Includes both gists and github repositories / Michael Haag (idea)
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

All lists (such as here) that are the same and that should be maintained together should be linked in the metadata as "similar".

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

All the rule should add a related similar to at least one rule

- '0x0.st'
- 'anonfiles.com'
- 'bashupload.com'
- 'cdn.discordapp.com'
- 'chunk.io'
- 'ddns.net'
- 'dl.dropboxusercontent.com'
- 'ghostbin.co'
Expand Down Expand Up @@ -50,6 +53,7 @@ detection:
- 'ufile.io'
- 'w3spaces.com'
- 'workers.dev'
- 'x0.at'
condition: selection
falsepositives:
- Unknown
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ references:
- https://www.microsoft.com/en-us/security/blog/2024/01/17/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs/
author: Florian Roth (Nextron Systems)
date: 2022-06-28
modified: 2024-10-21
modified: 2025-08-01
tags:
- attack.defense-evasion
- attack.persistence
Expand All @@ -22,8 +22,11 @@ detection:
EventID: 16403
RemoteName|contains:
- '.githubusercontent.com' # Includes both gists and github repositories / Michael Haag (idea)
- '0x0.st'
- 'anonfiles.com'
- 'bashupload.com'
- 'cdn.discordapp.com'
- 'chunk.io'
- 'ddns.net'
- 'dl.dropboxusercontent.com'
- 'ghostbin.co'
Expand Down Expand Up @@ -52,6 +55,7 @@ detection:
- 'ufile.io'
- 'w3spaces.com'
- 'workers.dev'
- 'x0.at'
condition: selection
falsepositives:
- Unknown
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ references:
- https://www.microsoft.com/en-us/security/blog/2024/01/17/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs/
author: Florian Roth (Nextron Systems)
date: 2022-08-24
modified: 2024-10-21
modified: 2025-08-01
tags:
- attack.defense-evasion
- attack.s0139
Expand All @@ -24,8 +24,11 @@ detection:
selection_domain:
Contents|contains:
- '.githubusercontent.com' # Includes both gists and github repositories / Michael Haag (idea)
- '0x0.st'
- 'anonfiles.com'
- 'bashupload.com'
- 'cdn.discordapp.com'
- 'chunk.io'
- 'ddns.net'
- 'dl.dropboxusercontent.com'
- 'ghostbin.co'
Expand Down Expand Up @@ -54,6 +57,7 @@ detection:
- 'ufile.io'
- 'w3spaces.com'
- 'workers.dev'
- 'x0.at'
selection_extension:
TargetFilename|contains:
- '.cpl:Zone'
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ references:
- https://www.microsoft.com/en-us/security/blog/2024/01/17/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs/
author: Florian Roth (Nextron Systems)
date: 2022-08-24
modified: 2024-10-21
modified: 2025-08-01
tags:
- attack.defense-evasion
- attack.s0139
Expand All @@ -23,8 +23,11 @@ detection:
selection_domain:
Contents|contains:
- '.githubusercontent.com' # Includes both gists and github repositories / Michael Haag (idea)
- '0x0.st'
- 'anonfiles.com'
- 'bashupload.com'
- 'cdn.discordapp.com'
- 'chunk.io'
- 'ddns.net'
- 'dl.dropboxusercontent.com'
- 'ghostbin.co'
Expand Down Expand Up @@ -53,6 +56,7 @@ detection:
- 'ufile.io'
- 'w3spaces.com'
- 'workers.dev'
- 'x0.at'
selection_extension:
TargetFilename|contains:
- '.bat:Zone'
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ references:
- https://www.linkedin.com/posts/kleiton-kurti_github-kleiton0x00redditc2-abusing-reddit-activity-7009939662462984192-5DbI/?originalSubdomain=al
author: Sorina Ionescu, X__Junior (Nextron Systems)
date: 2022-08-17
modified: 2024-10-21
modified: 2025-08-01
tags:
- attack.command-and-control
- attack.t1102
Expand All @@ -29,10 +29,13 @@ detection:
Initiated: 'true'
DestinationHostname|endswith:
- '.t.me'
- '0x0.st'
- '4shared.com'
- 'abuse.ch'
- 'anonfiles.com'
- 'bashupload.com'
- 'cdn.discordapp.com'
- 'chunk.io'
- 'cloudflare.com'
- 'ddns.net'
- 'discord.com'
Expand Down Expand Up @@ -76,6 +79,7 @@ detection:
- 'w3spaces.com'
- 'wetransfer.com'
- 'workers.dev'
- 'x0.at'
- 'youtube.com'
# Note: Add/Remove browsers/applications that you don't use or those that have custom install locations
# Note: To avoid complex conditions the filters for some apps are generic by name only. A custom tuning is recommended for best results
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ references:
- https://github.com/EmpireProject/Empire/blob/e37fb2eef8ff8f5a0a689f1589f424906fe13055/data/module_source/exfil/Invoke-ExfilDataToGitHub.ps1
author: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
date: 2018-08-30
modified: 2024-10-21
modified: 2025-08-01
tags:
- attack.command-and-control
- attack.t1105
Expand All @@ -40,8 +40,11 @@ detection:
Initiated: 'true'
DestinationHostname|endswith:
- '.githubusercontent.com' # Includes both gists and github repositories / Michael Haag (idea)
- '0x0.st'
- 'anonfiles.com'
- 'bashupload.com'
- 'cdn.discordapp.com'
- 'chunk.io'
- 'ddns.net'
- 'dl.dropboxusercontent.com'
- 'ghostbin.co'
Expand Down Expand Up @@ -71,6 +74,7 @@ detection:
- 'ufile.io'
- 'w3spaces.com'
- 'workers.dev'
- 'x0.at'
condition: all of selection_*
falsepositives:
- Some installers located in the temp directory might communicate with the Github domains in order to download additional software. Baseline these cases or move the github domain to a lower level hunting rule.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ references:
- https://docs.google.com/spreadsheets/d/17pSTDNpa0sf6pHeRhusvWG6rThciE8CsXTSlDUAZDyo
author: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
date: 2017-03-19
modified: 2024-08-22
modified: 2025-08-01
tags:
- attack.command-and-control
- attack.t1105
Expand All @@ -32,8 +32,11 @@ detection:
# Note: We exclude these domains to avoid duplicate filtering from e0f8ab85-0ac9-423b-a73a-81b3c7b1aa97
DestinationHostname|endswith:
- '.githubusercontent.com' # Includes both gists and github repositories / Michael Haag (idea)
- '0x0.st'
- 'anonfiles.com'
- 'bashupload.com'
- 'cdn.discordapp.com'
- 'chunk.io'
- 'ddns.net'
- 'dl.dropboxusercontent.com'
- 'ghostbin.co'
Expand Down Expand Up @@ -63,6 +66,7 @@ detection:
- 'ufile.io'
- 'w3spaces.com'
- 'workers.dev'
- 'x0.at'
condition: selection and not 1 of filter_main_*
falsepositives:
- Unknown
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ references:
- https://www.microsoft.com/en-us/security/blog/2024/01/17/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs/
author: Florian Roth (Nextron Systems)
date: 2022-06-28
modified: 2024-08-22
modified: 2025-08-01
tags:
- attack.defense-evasion
- attack.persistence
Expand All @@ -33,8 +33,11 @@ detection:
selection_domain:
CommandLine|contains:
- '.githubusercontent.com' # Includes both gists and github repositories / Michael Haag (idea)
- '0x0.st'
- 'anonfiles.com'
- 'bashupload.com'
- 'cdn.discordapp.com'
- 'chunk.io'
- 'ddns.net'
- 'dl.dropboxusercontent.com'
- 'ghostbin.co'
Expand Down Expand Up @@ -62,6 +65,7 @@ detection:
- 'ufile.io'
- 'w3spaces.com'
- 'workers.dev'
- 'x0.at'
condition: all of selection_*
falsepositives:
- Some legitimate apps use this, but limited.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -14,9 +14,10 @@ references:
- https://twitter.com/egre55/status/1087685529016193025
- https://lolbas-project.github.io/lolbas/Binaries/Certutil/
- https://www.microsoft.com/en-us/security/blog/2024/01/17/new-ttps-observed-in-mint-sandstorm-campaign-targeting-high-profile-individuals-at-universities-and-research-orgs/
- https://unit42.paloaltonetworks.com/advanced-backdoor-squidoor/
author: Nasreddine Bencherchali (Nextron Systems)
date: 2023-02-15
modified: 2024-08-22
modified: 2025-08-01
tags:
- attack.defense-evasion
- attack.t1027
Expand All @@ -34,8 +35,11 @@ detection:
selection_http:
CommandLine|contains:
- '.githubusercontent.com' # Includes both gists and github repositories / Michael Haag (idea)
- '0x0.st'
- 'anonfiles.com'
- 'bashupload.com'
- 'cdn.discordapp.com'
- 'chunk.io'
- 'ddns.net'
- 'dl.dropboxusercontent.com'
- 'ghostbin.co'
Expand Down Expand Up @@ -63,6 +67,7 @@ detection:
- 'ufile.io'
- 'w3spaces.com'
- 'workers.dev'
- 'x0.at'
condition: all of selection_*
falsepositives:
- Unknown
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ references:
- https://github.com/WithSecureLabs/iocs/blob/344203de742bb7e68bd56618f66d34be95a9f9fc/FIN7VEEAM/iocs.csv
author: Nasreddine Bencherchali (Nextron Systems)
date: 2023-05-05
modified: 2024-10-21
modified: 2025-08-01
tags:
- attack.execution
logsource:
Expand All @@ -20,8 +20,11 @@ detection:
selection_websites:
CommandLine|contains:
- '.githubusercontent.com' # Includes both gists and github repositories / Michael Haag (idea)
- '0x0.st'
- 'anonfiles.com'
- 'bashupload.com'
- 'cdn.discordapp.com'
- 'chunk.io'
- 'ddns.net'
- 'dl.dropboxusercontent.com'
- 'ghostbin.co'
Expand Down Expand Up @@ -50,6 +53,7 @@ detection:
- 'ufile.io'
- 'w3spaces.com'
- 'workers.dev'
- 'x0.at'
selection_http:
CommandLine|contains: 'http'
selection_flag:
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,52 @@
title: Curl File Upload To File Sharing Websites
id: e328cc73-f92a-42fb-b3fa-7c2cffda981a
related:
- id: 00bca14a-df4e-4649-9054-3f2aa676bc04
type: derived
- id: 7d1aaf3d-4304-425c-b7c3-162055e0b3ab
type: similar
status: experimental
description: Detects usage of curl to upload files to known file sharing domains, which may indicate data exfiltration.
author: Swachchhanda Shrawan Poudel (Nextron Systems)
references:
- https://unit42.paloaltonetworks.com/advanced-backdoor-squidoor/
date: 2025-08-01
tags:
- attack.exfiltration
- attack.t1567.002
logsource:
category: process_creation
product: windows
detection:
selection_img:
- Image|endswith: '\curl.exe'
- OriginalFileName: 'curl.exe'
selection_cli_domain:
CommandLine|contains:
- '0x0.st'
- 'bashupload.com'
- 'chunk.io'
- 'file.io'
- 'filebin.net'
- 'pastebin'
- 'send.firefox.com'
- 'temp.sh'
- 'transfer.sh'
- 'ufile.io'
- 'uploadfiles.io'
- 'wetransfer.com'
- 'x0.at'
selection_cli_flags:
- CommandLine|contains:
- ' --form'
- ' --upload-file'
- ' --data'
- ' -X POST'
- ' --request POST '
- CommandLine|re:
- '\s-[FTd]\s' # We use regex to ensure a case sensitive argument detection
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

we have the cased modified for it , but not sure many backend support it by now🐈‍⬛

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We should start using it imo. This should be handled by the backend/pySigma.

- '\s-sT\s'
condition: all of selection_*
falsepositives:
- Legitimate file uploads to these services by administrators or developers
level: high
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ references:
- https://www.huntress.com/blog/slashandgrab-screen-connect-post-exploitation-in-the-wild-cve-2024-1709-cve-2024-1708
author: Nasreddine Bencherchali (Nextron Systems)
date: 2024-02-23
modified: 2024-10-21
modified: 2025-08-01
tags:
- attack.execution
logsource:
Expand All @@ -27,8 +27,11 @@ detection:
CommandLine|contains:
# Note: You might want to baseline the github domain before including it
# - '.githubusercontent.com' # Includes both gists and github repositories / Michael Haag (idea).
- '0x0.st'
- 'anonfiles.com'
- 'bashupload.com'
- 'cdn.discordapp.com'
- 'chunk.io'
- 'ddns.net'
- 'dl.dropboxusercontent.com'
- 'ghostbin.co'
Expand Down Expand Up @@ -57,6 +60,7 @@ detection:
- 'ufile.io'
- 'w3spaces.com'
- 'workers.dev'
- 'x0.at'
selection_download:
CommandLine|contains:
- '.DownloadString('
Expand Down
Loading
Loading