Rule Library

Sigma Rules

11 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

DNS Query to External Service Interaction Domains

Detects suspicious DNS queries to external service interaction domains often used for out-of-band interactions after successful RCE

dns
TA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0043 · ReconnaissanceT1595.002 · Vulnerability Scanning
Florian Roth (Nextron Systems)+1Tue Jun 07network
Detectioncriticaltest

Cobalt Strike DNS Beaconing

Detects suspicious DNS queries known from Cobalt Strike beacons

dns
TA0011 · Command and ControlT1071.004 · DNS
Florian Roth (Nextron Systems)Thu May 10network
Detectionhighstable

Monero Crypto Coin Mining Pool Lookup

Detects suspicious DNS queries to Monero mining pools

dns
TA0040 · ImpactT1496 · Resource HijackingTA0010 · ExfiltrationT1567 · Exfiltration Over Web Service
Florian Roth (Nextron Systems)Sun Oct 24network
Detectionmediumtest

Suspicious DNS Query with B64 Encoded String

Detects suspicious DNS queries using base64 encoding

dns
TA0010 · ExfiltrationT1048.003 · Exfiltration Over Unencrypted Non-C2 ProtocolTA0011 · Command and ControlT1071.004 · DNS
Florian Roth (Nextron Systems)Thu May 10network
Detectionmediumtest

Telegram Bot API Request

Detects suspicious DNS queries to api.telegram.org used by Telegram Bots of any kind

dns
TA0011 · Command and ControlT1102.002 · Bidirectional Communication
Florian Roth (Nextron Systems)Tue Jun 05network
Detectionhightest

DNS TXT Answer with Possible Execution Strings

Detects strings used in command execution in DNS TXT Answer

dns
TA0011 · Command and ControlT1071.004 · DNS
Markus NeisWed Aug 08network
Detectionhightest

Wannacry Killswitch Domain

Detects wannacry killswitch domain dns queries

dns
TA0011 · Command and ControlT1071.001 · Web Protocols
Mike WadeWed Sep 16network
Emerging Threathightest

Potential Operation Triangulation C2 Beaconing Activity - DNS

Detects potential beaconing activity to domains used in 0day attacks on iOS devices and revealed by Kaspersky and the FSB

dns
TA0011 · Command and ControlG0020 · G0020detection.emerging-threats
Florian Roth (Nextron Systems)Thu Jun 012023
Emerging Threathighexperimental

DNS Query To Katz Stealer Domains - Network

Detects DNS queries to domains associated with Katz Stealer malware. Katz Stealer is a malware variant that is known to be used for stealing sensitive information from compromised systems. In Enterprise environments, DNS queries to these domains may indicate potential malicious activity or compromise.

dns
TA0011 · Command and ControlT1071.004 · DNSdetection.emerging-threats
Swachchhanda Shrawan Poudel (Nextron Systems)Thu May 222025
Emerging Threathighexperimental

Axios NPM Compromise Malicious C2 Domain DNS Query

Detects DNS queries for the malicious C2 domain associated with the plain-crypto-js/Axios npm package supply chain compromise. On March 30, 2026, malicious versions (1.14.1, 0.30.4) were published to npm, injecting a dependency (plain-crypto-js@4.2.1) that executed a postinstall script as a cross-platform RAT dropper. This detection detects endpoints attempting to resolve the attacker's C2 domain (sfrclak.com) used for command and control communication.

dns
TA0011 · Command and ControlT1071.001 · Web ProtocolsT1568 · Dynamic Resolutiondetection.emerging-threats
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Apr 012026
Threat Huntmediumexperimental

Low Reputation Effective Top-Level Domain (eTLD)

Detects DNS queries to domains within known low reputation eTLDs. This rule uses AlphaSOC's threat intelligence data and is updated on a monthly basis.

dns
TA0011 · Command and ControlT1071.004 · DNSTA0001 · Initial Accessdetection.threat-hunting
Norbert Jaśniewicz (AlphaSOC)Mon Aug 04network