Raw Paste Service Access
Detects direct access to raw pastes in different paste services often used by malware in their second stages to download malicious code in encrypted or encoded form
Sigma rule (View on GitHub)
1title: Raw Paste Service Access
2id: 5468045b-4fcc-4d1a-973c-c9c9578edacb
3status: test
4description: Detects direct access to raw pastes in different paste services often used by malware in their second stages to download malicious code in encrypted or encoded form
5references:
6 - https://www.virustotal.com/gui/domain/paste.ee/relations
7author: Florian Roth (Nextron Systems)
8date: 2019-12-05
9modified: 2023-01-19
10tags:
11 - attack.command-and-control
12 - attack.t1071.001
13 - attack.t1102.001
14 - attack.t1102.003
15 - attack.defense-evasion
16logsource:
17 category: proxy
18detection:
19 selection:
20 c-uri|contains:
21 - '.paste.ee/r/'
22 - '.pastebin.com/raw/'
23 - '.hastebin.com/raw/'
24 - '.ghostbin.co/paste/*/raw/'
25 - 'pastetext.net/'
26 - 'pastebin.pl/'
27 - 'paste.ee/'
28 condition: selection
29falsepositives:
30 - User activity (e.g. developer that shared and copied code snippets and used the raw link instead of just copy & paste)
31level: high
References
Related rules
- PwnDrp Access
- Bitsadmin to Uncommon IP Server Address
- Bitsadmin to Uncommon TLD
- ComRAT Network Communication
- HTTP Request With Empty User Agent