Kalambur Backdoor Curl TOR SOCKS Proxy Execution

Detects the execution of the "curl.exe" command, referencing "SOCKS" and ".onion" domains, which could be indicative of Kalambur backdoor activity.

Sigma rule (View on GitHub)

 1title: Kalambur Backdoor Curl TOR SOCKS Proxy Execution
 2id: e99375eb-3ee0-407a-9f90-79569cc6a01c
 3status: experimental
 4description: Detects the execution of the "curl.exe" command, referencing "SOCKS" and ".onion" domains, which could be indicative of Kalambur backdoor activity.
 5references:
 6    - https://blog.eclecticiq.com/sandworm-apt-targets-ukrainian-users-with-trojanized-microsoft-kms-activation-tools-in-cyber-espionage-campaigns
 7author: Arda Buyukkaya (EclecticIQ)
 8date: 2025-02-11
 9tags:
10    - attack.execution
11    - attack.command-and-control
12    - attack.t1090
13    - attack.t1573
14    - attack.t1071.001
15    - attack.t1059.001
16    - attack.s0183
17    - detection.emerging-threats
18logsource:
19    category: process_creation
20    product: windows
21detection:
22    selection_img:
23        Image|endswith: '\curl.exe'
24    selection_socks:
25        CommandLine|contains:
26            - 'socks5h://'
27            - 'socks5://'
28            - 'socks4a://'
29    selection_onion:
30        CommandLine|contains: '.onion'
31    condition: all of selection_*
32falsepositives:
33    - Unlikely
34level: high

References

Related rules

to-top