heroui logo

Download From Suspicious TLD - Whitelist

Sigma Rules

View Source
Summary
This rule aims to detect executable file downloads from suspicious top-level domains (TLDs), considering that certain domains pose a higher risk of malicious activity. The rule audits downloads by filtering requests based on file extensions commonly associated with executables, scripts, and potentially harmful documents. The detection logic categorically selects these file types while simultaneously filtering out requests from established and trusted domains such as '.com', '.org', '.net', and others that have verified reputations for safety. The absence of the filter indicates an alert will trigger on any file from a suspicious domain meeting the selection criteria, thus potentially highlighting initial access attempts by threat actors via downloaded malicious content.
Categories
  • Web
  • Network
Data Sources
  • Web Credential
  • Network Traffic
Created: 2017-03-13