Network Connection Initiated To Mega.nz
Detects a network connection initiated by a binary to "api.mega.co.nz". Attackers were seen abusing file sharing websites similar to "mega.nz" in order to upload/download additional payloads.
Sigma rule (View on GitHub)
1title: Network Connection Initiated To Mega.nz
2id: fdeebdf0-9f3f-4d08-84a6-4c4d13e39fe4
3status: test
4description: |
5 Detects a network connection initiated by a binary to "api.mega.co.nz".
6 Attackers were seen abusing file sharing websites similar to "mega.nz" in order to upload/download additional payloads.
7references:
8 - https://megatools.megous.com/
9 - https://www.mandiant.com/resources/russian-targeting-gov-business
10author: Florian Roth (Nextron Systems)
11date: 2021-12-06
12modified: 2024-05-31
13tags:
14 - attack.exfiltration
15 - attack.t1567.001
16logsource:
17 category: network_connection
18 product: windows
19detection:
20 selection:
21 Initiated: 'true'
22 DestinationHostname|endswith:
23 - 'mega.co.nz'
24 - 'mega.nz'
25 condition: selection
26falsepositives:
27 - Legitimate MEGA installers and utilities are expected to communicate with this domain. Exclude hosts that are known to be allowed to use this tool.
28level: low
References
Related rules
- Network Connection Initiated To Cloudflared Tunnels Domains
- Process Initiated Network Connection To Ngrok Domain
- APT40 Dropbox Tool User Agent
- AWS EC2 VM Export Failure
- AWS RDS Master Password Change