Adversaries may be using known malicious URLs to download malware into the network, bypassing traditional detection mechanisms. SOC teams should proactively hunt for these URLs in Azure Sentinel to identify and mitigate potential malware infections before they spread.
IOC Summary
Threat: malware_download Total URLs: 19 Active URLs: 8
| URL | Status | Threat | Date Added |
|---|---|---|---|
hxxp://27.220.90.116:38166/bin.sh | online | malware_download | 2026-05-17 |
hxxp://182.127.168.188:39593/bin.sh | online | malware_download | 2026-05-17 |
hxxp://116.138.221.216:40539/i | online | malware_download | 2026-05-17 |
hxxp://116.138.221.216:40539/bin.sh | online | malware_download | 2026-05-17 |
hxxp://123.14.218.47:45985/bin.sh | online | malware_download | 2026-05-17 |
hxxp://42.228.33.42:42803/i | online | malware_download | 2026-05-17 |
hxxp://94.156.152.234/bot.exe | online | malware_download | 2026-05-17 |
hxxp://94.156.152.234/miner.sh | offline | malware_download | 2026-05-17 |
hxxp://94.156.152.234/armv71 | offline | malware_download | 2026-05-17 |
hxxp://176.65.139.114/bot.exe | online | malware_download | 2026-05-17 |
hxxp://176.65.139.114/miner.sh | offline | malware_download | 2026-05-17 |
hxxp://5.231.230.158:8888/bot_v8.arm | offline | malware_download | 2026-05-17 |
hxxp://5.231.230.158:8888/bot_v7.mipsel | offline | malware_download | 2026-05-17 |
hxxp://5.231.230.158:8888/bot_v7.arm | offline | malware_download | 2026-05-17 |
hxxp://5.231.230.158:8888/x.armel | offline | malware_download | 2026-05-17 |
hxxp://5.231.230.158:8888/x.mips64 | offline | malware_download | 2026-05-17 |
hxxp://5.231.230.158:8888/bot_v6.x86_64 | offline | malware_download | 2026-05-17 |
hxxp://5.231.230.158:8888/bot_v8.mips | offline | malware_download | 2026-05-17 |
hxxp://5.231.230.158:8888/x.i386 | offline | malware_download | 2026-05-17 |
// Hunt for DNS resolution of URLhaus malicious domains
// Threat: malware_download
let malicious_domains = dynamic(["42.228.33.42", "182.127.168.188", "27.220.90.116", "123.14.218.47", "94.156.152.234", "176.65.139.114", "116.138.221.216"]);
DnsEvents
| where Name has_any (malicious_domains)
| project TimeGenerated, Computer, Name, IPAddresses
| order by TimeGenerated desc
// Hunt for web traffic to URLhaus malicious domains
let malicious_domains = dynamic(["42.228.33.42", "182.127.168.188", "27.220.90.116", "123.14.218.47", "94.156.152.234", "176.65.139.114", "116.138.221.216"]);
CommonSecurityLog
| where RequestURL has_any (malicious_domains) or DestinationHostName has_any (malicious_domains)
| project TimeGenerated, SourceIP, RequestURL, DestinationHostName, DeviceAction
| order by TimeGenerated desc
| Sentinel Table | Notes |
|---|---|
CommonSecurityLog | Ensure this data connector is enabled |
DnsEvents | Ensure this data connector is enabled |
Scenario: Legitimate Software Update via URL
Description: A system administrator manually downloads a legitimate software update from a known vendor URL (e.g., https://download.microsoft.com) using a script or a tool like curl or wget.
Filter/Exclusion: Exclude URLs containing known vendor domains (e.g., microsoft.com, mozilla.org, google.com) or use a field filter like url contains "download.microsoft.com".
Scenario: Scheduled System Maintenance Job
Description: A scheduled job (e.g., using cron or Task Scheduler) runs a script that connects to a remote server to fetch configuration files or logs (e.g., https://internal-logs.example.com).
Filter/Exclusion: Exclude URLs that match internal IP ranges or internal domain names (e.g., internal-logs.example.com) using a dest_ip or domain filter.
Scenario: Admin Access via Remote Desktop
Description: An administrator uses Remote Desktop Protocol (RDP) to connect to a remote server, and the connection process involves a URL redirect or a legitimate login page (e.g., https://rdp.example.com).
Filter/Exclusion: Exclude URLs that match internal RDP endpoints or use a process.name filter like mstsc.exe or remoting.exe.
Scenario: Automated Backup Job to Cloud Storage
Description: A backup tool like Veeam or Commvault uploads backup data to a cloud storage bucket (e.g., https://s3.amazonaws.com/backup-bucket).
Filter/Exclusion: Exclude URLs containing cloud storage endpoints (e.g., s3.amazonaws.com) or use a process.name filter like veeam.exe or commvault.exe.
**Scenario: User-Init