heroui logo

DNS Query To Ufile.io - DNS Client

Sigma Rules

View Source
Summary
This rule is designed to detect DNS queries specifically targeting the domain "ufile.io", known for its association with malware activity and potential data exfiltration tactics employed by threat actors. By monitoring Event ID 3008 from the Windows DNS Client, the rule identifies queries where the 'QueryName' contains 'ufile.io'. Proper event collection from Microsoft-Windows-DNS Client Events is essential for this detection to function effectively. Analysts should be aware of the potential for false positives, as not all DNS queries related to 'ufile' indicate malicious intent; thorough investigation of the source of queries is required. The rule has been categorized under the attack techniques related to exfiltration, specifically T1567.002, highlighting its relevance in tracking data leaks.
Categories
  • Network
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Network Traffic
  • Process
Created: 2023-01-16