275. Hunting for Suspicious URLs

Hello everyone!

How often do you use proxy logs for threat hunting? I hope often enough as C2 communications may involve accessing quite interesting URLs. Let's look at a few examples!

The first one is related to an activity cluster we track as Watch Wolf. If you look at the example, you can see that the malware accesses the following URL:

hxxps://4ad74aab[.]cfd/index.php

Of course, even the domain itself is quite suspicious, including the TLD, but the URL also contains "index.php", so we can use both to create a hunting query.

Another example - Rhadamanthys. And another suspicious URL, of course:

hxxps://193.84.71[.]81/gateway/wcm6paht.htbq1

Here we also have an interesting part for building a hunting query - "gateway". 

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge