← Back to SOC feed Coverage →

URLhaus: ClearFake Malicious URLs

ioc-hunt HIGH URLhaus
CommonSecurityLogDnsEvents
iocurlhaus
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at URLhaus →
Retrieved: 2026-05-09T11:00:00Z · Confidence: medium

Hunt Hypothesis

The hunt hypothesis detects adversaries using ClearFake malicious URLs to deliver malware or exfiltrate data, leveraging compromised or phishing-linked domains. SOC teams should proactively hunt for these URLs in Azure Sentinel to identify and mitigate potential compromise of internal systems and data exfiltration attempts.

IOC Summary

Threat: ClearFake Total URLs: 54 Active URLs: 38

URLStatusThreatDate Added
hxxps://pal3t8-loop.messy-zamai.pics/99c7fa93-4d32-47c2-84f9-163f7755f5e3/check.rockonlinemalware_download2026-05-09
hxxps://voicemacro.nova7frame.life/c2cb43a1-3db9-486a-a707-ee88bcdb4813/google.ocxofflinemalware_download2026-05-09
hxxps://voyagefroz.messy-zamai.pics/99c7fa93-4d32-47c2-84f9-163f7755f5e3/check.rockonlinemalware_download2026-05-09
hxxps://03f7.nova7frame.life/c2cb43a1-3db9-486a-a707-ee88bcdb4813/google.ocxonlinemalware_download2026-05-09
hxxps://fcbxn.nova7frame.life/c2cb43a1-3db9-486a-a707-ee88bcdb4813/google.ocxofflinemalware_download2026-05-09
hxxps://gene-track.messy-zamai.pics/99c7fa93-4d32-47c2-84f9-163f7755f5e3/check.rockonlinemalware_download2026-05-09
hxxp://74l3it.messy-zamai.pics/99c7fa93-4d32-47c2-84f9-163f7755f5e3/check.rockofflinemalware_download2026-05-09
hxxps://74l3it.messy-zamai.pics/99c7fa93-4d32-47c2-84f9-163f7755f5e3/check.rockonlinemalware_download2026-05-09
hxxps://3e30omav.velorix.life/c2cb43a1-3db9-486a-a707-ee88bcdb4813/google.ocxonlinemalware_download2026-05-09
hxxp://98yn.messy-zamai.pics/99c7fa93-4d32-47c2-84f9-163f7755f5e3/check.rockofflinemalware_download2026-05-09
hxxps://98yn.messy-zamai.pics/99c7fa93-4d32-47c2-84f9-163f7755f5e3/check.rockofflinemalware_download2026-05-09
hxxps://meta-1nspect.velorix.life/c2cb43a1-3db9-486a-a707-ee88bcdb4813/google.ocxofflinemalware_download2026-05-09
hxxps://67b0njwj.velorix.life/c2cb43a1-3db9-486a-a707-ee88bcdb4813/google.ocxonlinemalware_download2026-05-09
hxxps://steri-data.nanovo5kull.pics/99c7fa93-4d32-47c2-84f9-163f7755f5e3/check.rockonlinemalware_download2026-05-09
hxxps://wildmerg.nanovo5kull.pics/99c7fa93-4d32-47c2-84f9-163f7755f5e3/check.rockonlinemalware_download2026-05-09
hxxps://iscx3.velorix.life/c2cb43a1-3db9-486a-a707-ee88bcdb4813/google.ocxonlinemalware_download2026-05-09
hxxps://fox-glow.nanovo5kull.pics/99c7fa93-4d32-47c2-84f9-163f7755f5e3/check.rockonlinemalware_download2026-05-09
hxxps://geo-gu1d3.velorix.life/c2cb43a1-3db9-486a-a707-ee88bcdb4813/google.ocxonlinemalware_download2026-05-09
hxxps://fllegi2j.nanovo5kull.pics/99c7fa93-4d32-47c2-84f9-163f7755f5e3/check.rockonlinemalware_download2026-05-09
hxxps://mramn.velorix.life/c2cb43a1-3db9-486a-a707-ee88bcdb4813/google.ocxonlinemalware_download2026-05-09
hxxps://9rtfhxav.nanovo5kull.pics/99c7fa93-4d32-47c2-84f9-163f7755f5e3/check.rockonlinemalware_download2026-05-09
hxxps://mercore7is.velorix.life/c2cb43a1-3db9-486a-a707-ee88bcdb4813/google.ocxonlinemalware_download2026-05-09
hxxps://memory-tone.nanovo5kull.pics/99c7fa93-4d32-47c2-84f9-163f7755f5e3/check.rockonlinemalware_download2026-05-09
hxxps://dsff.softwincli.pics/c2cb43a1-3db9-486a-a707-ee88bcdb4813/google.ocxonlinemalware_download2026-05-09
hxxps://sshpro.skynodecfg.pics/99c7fa93-4d32-47c2-84f9-163f7755f5e3/check.rockofflinemalware_download2026-05-09

KQL: Url Dns Hunt

// Hunt for DNS resolution of URLhaus malicious domains
// Threat: ClearFake
let malicious_domains = dynamic(["74l3it.messy-zamai.pics", "apiops.softnetlink.pics", "gene-track.messy-zamai.pics", "67b0njwj.velorix.life", "ops.softwincli.pics", "877zsa.earoauth.life", "git.softwincli.pics", "tcp.skynodecfg.pics", "3e30omav.velorix.life", "03f7.nova7frame.life", "steri-data.nanovo5kull.pics", "tcp.skyprodoc.pics", "voyagefroz.messy-zamai.pics", "pal3t8-loop.messy-zamai.pics", "9rtfhxav.nanovo5kull.pics", "mramn.velorix.life", "fllegi2j.nanovo5kull.pics", "cli.softwincli.pics", "netman.skynodecfg.pics", "memory-tone.nanovo5kull.pics", "sys.softnetlink.pics", "webdoc.softnetlink.pics", "geo-gu1d3.velorix.life", "mercore7is.velorix.life", "dsff.softwincli.pics", "iscx3.velorix.life", "bin.softwincli.pics", "app.softnetlink.pics", "wildmerg.nanovo5kull.pics", "fox-glow.nanovo5kull.pics"]);
DnsEvents
| where Name has_any (malicious_domains)
| project TimeGenerated, Computer, Name, IPAddresses
| order by TimeGenerated desc

KQL: Url Proxy Hunt

// Hunt for web traffic to URLhaus malicious domains
let malicious_domains = dynamic(["74l3it.messy-zamai.pics", "apiops.softnetlink.pics", "gene-track.messy-zamai.pics", "67b0njwj.velorix.life", "ops.softwincli.pics", "877zsa.earoauth.life", "git.softwincli.pics", "tcp.skynodecfg.pics", "3e30omav.velorix.life", "03f7.nova7frame.life", "steri-data.nanovo5kull.pics", "tcp.skyprodoc.pics", "voyagefroz.messy-zamai.pics", "pal3t8-loop.messy-zamai.pics", "9rtfhxav.nanovo5kull.pics", "mramn.velorix.life", "fllegi2j.nanovo5kull.pics", "cli.softwincli.pics", "netman.skynodecfg.pics", "memory-tone.nanovo5kull.pics", "sys.softnetlink.pics", "webdoc.softnetlink.pics", "geo-gu1d3.velorix.life", "mercore7is.velorix.life", "dsff.softwincli.pics", "iscx3.velorix.life", "bin.softwincli.pics", "app.softnetlink.pics", "wildmerg.nanovo5kull.pics", "fox-glow.nanovo5kull.pics"]);
CommonSecurityLog
| where RequestURL has_any (malicious_domains) or DestinationHostName has_any (malicious_domains)
| project TimeGenerated, SourceIP, RequestURL, DestinationHostName, DeviceAction
| order by TimeGenerated desc

Required Data Sources

Sentinel TableNotes
CommonSecurityLogEnsure this data connector is enabled
DnsEventsEnsure this data connector is enabled

References

False Positive Guidance

Original source: https://urlhaus.abuse.ch/