Communication To Ngrok Domains

Detects an executable accessing ngrok domains, which could be a sign of forbidden data exfiltration by malicious actors

Sigma rule (View on GitHub)

 1title: Communication To Ngrok Domains
 2id: 18249279-932f-45e2-b37a-8925f2597670
 3status: test
 4description: Detects an executable accessing ngrok domains, which could be a sign of forbidden data exfiltration by malicious actors
 5references:
 6    - https://ngrok.com/
 7    - https://ngrok.com/blog-post/new-ngrok-domains
 8    - https://www.virustotal.com/gui/file/cca0c1182ac114b44dc52dd2058fcd38611c20bb6b5ad84710681d38212f835a/
 9    - https://www.rnbo.gov.ua/files/2023_YEAR/CYBERCENTER/november/APT29%20attacks%20Embassies%20using%20CVE-2023-38831%20-%20report%20en.pdf
10author: Florian Roth (Nextron Systems)
11date: 2022/07/16
12modified: 2023/11/17
13tags:
14    - attack.exfiltration
15    - attack.t1567.001
16logsource:
17    category: network_connection
18    product: windows
19detection:
20    selection:
21        Initiated: 'true'
22        DestinationHostname|endswith:
23            - '.ngrok-free.app'
24            - '.ngrok-free.dev'
25            - '.ngrok.app'
26            - '.ngrok.dev'
27            - '.ngrok.io'
28    condition: selection
29falsepositives:
30    - Legitimate use of ngrok domains
31level: high

References

Related rules

to-top