← Back to SOC feed Coverage →

HackTool - BabyShark Agent Default URL Pattern

sigma CRITICAL SigmaHQ
T1071.001
imWebSession
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T02:50:08Z · Confidence: medium

Hunt Hypothesis

The hypothesis is that the detected communication pattern indicates an adversary is using the BabyShark C2 framework to establish command and control over compromised hosts. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate potential persistent threats leveraging the BabyShark agent’s default URL patterns.

Detection Rule

Sigma (Original)

title: HackTool - BabyShark Agent Default URL Pattern
id: 304810ed-8853-437f-9e36-c4975c3dfd7e
status: test
description: Detects Baby Shark C2 Framework default communication patterns
references:
    - https://nasbench.medium.com/understanding-detecting-c2-frameworks-babyshark-641be4595845
author: Florian Roth (Nextron Systems)
date: 2021-06-09
modified: 2024-02-15
tags:
    - attack.command-and-control
    - attack.t1071.001
logsource:
    category: proxy
detection:
    selection:
        c-uri|contains: 'momyshark\?key='
    condition: selection
falsepositives:
    - Unlikely
level: critical

KQL (Azure Sentinel)

imWebSession
| where Url contains "momyshark?key="

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/web/proxy_generic/proxy_hktl_baby_shark_default_agent_url.yml