275. Hunting for Suspicious URLs
Hello everyone!
How often do you use proxy logs for threat hunting? I hope often enough as C2 communications may involve accessing quite interesting URLs. Let's look at a few examples!
The first one is related to an activity cluster we track as Watch Wolf. If you look at the example, you can see that the malware accesses the following URL:
hxxps://4ad74aab[.]cfd/index.php
Of course, even the domain itself is quite suspicious, including the TLD, but the URL also contains "index.php", so we can use both to create a hunting query.
Another example - Rhadamanthys. And another suspicious URL, of course:
hxxps://193.84.71[.]81/gateway/wcm6paht.htbq1
Here we also have an interesting part for building a hunting query - "gateway".
See you tomorrow!
Comments
Post a Comment