DNS Query To Put.io - DNS Client

Detects DNS queries for subdomains related to "Put.io" sharing website.

Sigma rule (View on GitHub)

 1title: DNS Query To Put.io - DNS Client
 2id: 8b69fd42-9dad-4674-abef-7fdef43ef92a
 3status: experimental
 4description: Detects DNS queries for subdomains related to "Put.io" sharing website.
 5references:
 6    - https://darkatlas.io/blog/medusa-ransomware-group-opsec-failure
 7author: Omar Khaled (@beacon_exe)
 8date: 2024-08-23
 9tags:
10    - attack.command-and-control
11logsource:
12    product: windows
13    service: dns-client
14    definition: 'Requirements: Microsoft-Windows-DNS Client Events/Operational Event Log must be enabled/collected in order to receive the events.'
15detection:
16    selection:
17        EventID: 3008
18        QueryName|contains:
19            - 'api.put.io'
20            - 'upload.put.io'
21    condition: selection
22falsepositives:
23    - Legitimate DNS queries and usage of Put.io
24level: medium

References

Related rules

to-top