-
-
Notifications
You must be signed in to change notification settings - Fork 2.5k
update: suspicious file activity related to file sharing websites #5574
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Changes from all commits
f50efcd
ee9220c
3347546
711af16
01031bc
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,52 @@ | ||
| title: Curl File Upload To File Sharing Websites | ||
| id: e328cc73-f92a-42fb-b3fa-7c2cffda981a | ||
| related: | ||
| - id: 00bca14a-df4e-4649-9054-3f2aa676bc04 | ||
| type: derived | ||
| - id: 7d1aaf3d-4304-425c-b7c3-162055e0b3ab | ||
| type: similar | ||
| status: experimental | ||
| description: Detects usage of curl to upload files to known file sharing domains, which may indicate data exfiltration. | ||
| author: Swachchhanda Shrawan Poudel (Nextron Systems) | ||
| references: | ||
| - https://unit42.paloaltonetworks.com/advanced-backdoor-squidoor/ | ||
| date: 2025-08-01 | ||
| tags: | ||
| - attack.exfiltration | ||
| - attack.t1567.002 | ||
| logsource: | ||
| category: process_creation | ||
| product: windows | ||
| detection: | ||
| selection_img: | ||
| - Image|endswith: '\curl.exe' | ||
| - OriginalFileName: 'curl.exe' | ||
| selection_cli_domain: | ||
| CommandLine|contains: | ||
| - '0x0.st' | ||
| - 'bashupload.com' | ||
| - 'chunk.io' | ||
| - 'file.io' | ||
| - 'filebin.net' | ||
| - 'pastebin' | ||
| - 'send.firefox.com' | ||
| - 'temp.sh' | ||
| - 'transfer.sh' | ||
| - 'ufile.io' | ||
| - 'uploadfiles.io' | ||
| - 'wetransfer.com' | ||
| - 'x0.at' | ||
| selection_cli_flags: | ||
| - CommandLine|contains: | ||
| - ' --form' | ||
| - ' --upload-file' | ||
| - ' --data' | ||
| - ' -X POST' | ||
| - ' --request POST ' | ||
| - CommandLine|re: | ||
| - '\s-[FTd]\s' # We use regex to ensure a case sensitive argument detection | ||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. we have the
Collaborator
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. We should start using it imo. This should be handled by the backend/pySigma. |
||
| - '\s-sT\s' | ||
| condition: all of selection_* | ||
| falsepositives: | ||
| - Legitimate file uploads to these services by administrators or developers | ||
| level: high | ||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
All lists (such as here) that are the same and that should be maintained together should be linked in the metadata as "similar".
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
All the rule should add a related similar to at least one rule