heroui logo

DNS Query for Anonfiles.com Domain - Sysmon

Sigma Rules

View Source
Summary
This detection rule utilizes Sysmon to identify DNS queries targeting the domain "anonfiles.com", known for facilitating anonymous file uploads which can often serve malicious intent, such as sharing ransomware or other illicit content. The rule specifically looks for query strings that contain ".anonfiles.com", which could indicate attempts to access resources hosted on this domain. Given that this platform is associated with file exfiltration or distribution by threat actors, monitoring such queries is vital for early detection of potential data breaches or malicious activity involving file transfers. The rule reports a high threat level due to the domain's notorious usage within cybercrime circles, making it essential for organizations to remain vigilant to minimize risks of data compromise. While detecting these queries is crucial, it is also noteworthy that there might be rare legitimate scenarios where users access anonymized files, which could lead to false positive alerts. Adjustments may be necessary in environments where access to the domain is not inherently malicious to reduce unnecessary noise in alerts.
Categories
  • Network
  • Endpoint
  • Cloud
Data Sources
  • Domain Name
  • Network Traffic
Created: 2022-07-15