A quick thread.

Review of the URL's submitted to URLhaus in the past 30 days.

53109 URLs reported, lets look for patterns; which we can use for threat hunting and detection in DNS entries and proxies logs.

#infosec #cybersecurity #threathunting
25494 of the URLs end with Mozi.m, relating to the Mozi Botnet - securityintelligence.com/posts/botnet-a…. To detect this, we can look for the regex pattern .*Mozi\.m$

A further 4636 of the URLs end with Mozi.a, related to the above. We can detect this using regex pattern .*Mozi\.a$
Finally, there are 10 URLs which contain Mozi within them in different patterns to above. It is therefore worthwhile searching for any case of Mozi within a URL (This will be greedier than the above, but still worthwhile checking)
Next up, there are 5716 URLs ending /i and 196 URLs ending in /.i To find these, search for the regex pattern .*\/(i|\.i)$
4752 of the URL's are ending with bin.sh. To find these, search for the regex pattern .*\/bin\.sh$

458 of the URL's are ending with .arm followed by a digit. To find these, search for the regex pattern .*\.arm\d+$
99 of the URLs are ending with .arm. To find these, search for the regex pattern .*\.arm$

165 of the URL's are ending with .mips. To find these, search for the regex pattern .*\.mips$

145 of the URL's are ending with.mpsl. To find these, search for the regex pattern .*\.mpsl$
870 of the URLs contain the pattern wp-
34 of the URLs contain the pattern wordpress

To look for these 904 URLs relating to wordpress, we can use this regex pattern to find URLs matching this in our logs - .*(wp-|wordpress).*.
For alerting purposes, it is worth looking for the string - (http|https):\/\/.*(wp-|wordpress).*\.(exe|bin|zip|jpg|vbs|bat|rar|ps1|doc|docm|xls|xlsm|pptm|rtf|hta|dll|ws|wsf|sct) As this will show a user visiting a file at a wordpress site.
Using the above methods, we can look for / detect 42379 out of the 53109 URLs reported in the past month (79.796%)
Whilst you are here, check your logs for any communications with these TLDs - spamhaus.org/statistics/tld…
Forgot to mention, I got the URLs from urlhaus.abuse.ch/downloads/csv_…

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with blueteamblog

blueteamblog Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @blueteamblog

6 Jan
Quick #Emotet thread with detections / mitigations etc since there has been a spike in the past few months.

Firstly, it is worth blocking the URL's, Domains and IP addresses found at the following links -

paste.cryptolaemus.com
feodotracker.abuse.ch/downloads/ipbl…
urlhaus.abuse.ch/downloads/csv_…
Cryptolaemus also contains Emotet hashes in their releases - check for these on your network if possible.

Next, It is worth setting up detections in your SIEM for any communications to the URL's, Domains and IP addresses found at the following links -
Read 7 tweets
21 Dec 20
SIEM info thread.

I have posts with rules, SIEM best practices, threat hunting - blueteamblog.com

Free SIEM rules -

github.com/Azure/Azure-Se…
github.com/Neo23x0/sigma/…
github.com/elastic/detect…
github.com/elastic/detect…
my.socprime.com/tdm/ (partially free)
Understanding commonly used log formats :

Windows Security Event Logs – search Event ID here – ultimatewindowssecurity.com/securitylog/en…
Azure AD Audit logs – docs.microsoft.com/en-us/azure/ac…
Azure AD SignIn logs – docs.microsoft.com/en-us/azure/ac…
Linux Logs – plesk.com/blog/featured/…

1/2
Read 5 tweets
13 Dec 20
I have a lot of people asking me ‘Will SOAR / Automation in general replace SOC/Cybersecurity Analyst jobs in X number of years’

My opinion - Simple answer, no.

Long answer, it is already (and will in all SOCs in the future) replace simple tasks such as copy pasting info

1/
From tools into ticketing platforms, sorting mailboxes, running scans on IOCs and things such as this. (Which in a lot of cases are currently classed as Tier/Level 1 analysts tasks)

It will not replace expert knowledge, such as in-depth analysis skills, remediating difficult

2/
Problems (Incident Response), threat Intel investigations / reporting, risk mitigation etc etc. The list goes on of tasks and skills which SOAR/Automation will not replace any time soon.

So don’t be worried - SOAR/Automation should be thought of as an assistant for us all

3/
Read 7 tweets
22 Nov 20
Work in #Infosec / #CyberSecurity?

Here are some tools I have been using recently that I think will make your life easier!

Got any you would like to share? Put them in the comments. 😀

Sooty (All in one CLI tool) - github.com/TheresAFewCono…
Intel Owl (Threat intel data about a specific file IOC from a single API at scale) - github.com/intelowlprojec…

Cyber Chef (Web app for carrying out all manner of "cyber" operations within a web browser.) - gchq.github.io/CyberChef/
TheHive (Scalable Incident Response Platform designed to make life easier for SOCs, CSIRTs, and CERTs, featuring integration with MISP.) - thehive-project.org

CertSpotter (Alerts you when a SSL/TLS certificate is issued for one of your domains.) - github.com/SSLMate/certsp…
Read 4 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!