
Summary
This rule is designed to detect DNS queries directed towards domains that are frequently associated with malware hosting or URL redirection commonly used by threat actors. The focus is specifically on known malicious domains such as Cloudflare Workers, TryCloudflare, InfinityFree, and various URL shorteners like tinyurl.com and lihi.cc. These types of queries can flag potential indicators of either malware delivery attempts or command-and-control (C2) communication activities. The rule employs pattern recognition on the 'QueryName' field to identify specific domain queries indicative of potential threats, allowing organizations to identify suspicious DNS activity that may compromise their systems. While legitimate use of these services may occur, it is quite rare in typical enterprise environments, making this rule a strategic asset in the defense against malicious actions.
Categories
- Network
- Endpoint
- Windows
Data Sources
- Domain Name
- Network Traffic
- Logon Session
Created: 2025-06-02