Ursnif Malware Download URL Pattern
Detects download of Ursnif malware done by dropper documents.
Sigma rule (View on GitHub)
1title: Ursnif Malware Download URL Pattern
2id: a36ce77e-30db-4ea0-8795-644d7af5dfb4
3status: stable
4description: Detects download of Ursnif malware done by dropper documents.
5references:
6 - https://notebook.community/Cyb3rWard0g/HELK/docker/helk-jupyter/notebooks/sigma/proxy_ursnif_malware
7author: Thomas Patzke
8date: 2019-12-19
9modified: 2022-08-15
10logsource:
11 category: proxy
12tags:
13 - attack.command-and-control
14 - attack.t1071.001
15 - detection.emerging-threats
16detection:
17 selection:
18 c-uri|contains|all:
19 - '/'
20 - '.php\?l='
21 c-uri|endswith: '.cab'
22 sc-status: 200
23 condition: selection
24falsepositives:
25 - Unknown
26level: high
References
Related rules
- APT40 Dropbox Tool User Agent
- Chafer Malware URL Pattern
- ComRAT Network Communication
- Ursnif Malware C2 URL Pattern
- Katz Stealer Suspicious User-Agent