← Back to SOC feed Coverage →

Raw Paste Service Access

sigma HIGH SigmaHQ
T1071.001T1102.001T1102.003
imWebSession
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T02:50:08Z · Confidence: medium

Hunt Hypothesis

Adversaries may use raw paste services to exfiltrate or download encrypted/encoded payloads as part of their second-stage malware deployment. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential malware execution and data exfiltration activities early.

Detection Rule

Sigma (Original)

title: Raw Paste Service Access
id: 5468045b-4fcc-4d1a-973c-c9c9578edacb
status: test
description: Detects direct access to raw pastes in different paste services often used by malware in their second stages to download malicious code in encrypted or encoded form
references:
    - https://www.virustotal.com/gui/domain/paste.ee/relations
author: Florian Roth (Nextron Systems)
date: 2019-12-05
modified: 2023-01-19
tags:
    - attack.command-and-control
    - attack.t1071.001
    - attack.t1102.001
    - attack.t1102.003
    - attack.defense-evasion
logsource:
    category: proxy
detection:
    selection:
        c-uri|contains:
            - '.paste.ee/r/'
            - '.pastebin.com/raw/'
            - '.hastebin.com/raw/'
            - '.ghostbin.co/paste/*/raw/'
            - 'pastetext.net/'
            - 'pastebin.pl/'
            - 'paste.ee/'
    condition: selection
falsepositives:
    - User activity (e.g. developer that shared and copied code snippets and used the raw link instead of just copy & paste)
level: high

KQL (Azure Sentinel)

imWebSession
| where Url contains ".paste.ee/r/" or Url contains ".pastebin.com/raw/" or Url contains ".hastebin.com/raw/" or (Url contains ".ghostbin.co/paste/" and Url contains "/raw/") or Url contains "pastetext.net/" or Url contains "pastebin.pl/" or Url contains "paste.ee/"

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/web/proxy_generic/proxy_raw_paste_service_access.yml