The ThreatFox: Unknown malware IOCs rule detects potential adversary activity involving previously unidentified malicious indicators, suggesting the presence of unknown malware in the environment. SOC teams should proactively hunt for these IOCs in Azure Sentinel to identify and mitigate advanced threats that evade traditional detection methods.
IOC Summary
Malware Family: Unknown malware Total IOCs: 36 IOC Types: sha256_hash, url, domain, ip:port
| Type | Value | Threat Type | First Seen | Confidence |
|---|---|---|---|---|
| domain | jsonapi.biz | botnet_cc | 2026-04-24 | 49% |
| domain | jsonserv.biz | botnet_cc | 2026-04-24 | 49% |
| domain | jsonserv.xyz | botnet_cc | 2026-04-24 | 49% |
| url | hxxps://audit.checkmarx.cx/v1/telemetry | botnet_cc | 2026-04-24 | 49% |
| url | hxxps://api.github.com/search/commits?q=beautifulcastle | botnet_cc | 2026-04-24 | 49% |
| domain | cloudfront-021.s3.us-west-2.amazonaws.com | botnet_cc | 2026-04-24 | 49% |
| domain | domainaudit.checkmarx.cx | botnet_cc | 2026-04-24 | 49% |
| domain | audit.checkmarx.cx | botnet_cc | 2026-04-24 | 49% |
| url | hxxps://mymeetingtoday.com/download.php | payload_delivery | 2026-04-24 | 100% |
| url | hxxps://mymeetingtoday.com/microsoft-store.html | payload_delivery | 2026-04-24 | 100% |
| domain | mymeetingtoday.com | payload_delivery | 2026-04-24 | 100% |
| url | hxxps://mymeetinggoogle.com/download.php | payload_delivery | 2026-04-24 | 100% |
| url | hxxps://mymeetinggoogle.com/microsoft-store.html | payload_delivery | 2026-04-24 | 100% |
| domain | mymeetinggoogle.com | payload_delivery | 2026-04-24 | 100% |
| url | hxxps://livemeetgooogle.com/metro/download.php | payload_delivery | 2026-04-24 | 100% |
| url | hxxps://livemeetgooogle.com/microsoft-store.html | payload_delivery | 2026-04-24 | 100% |
| domain | livemeetgooogle.com | payload_delivery | 2026-04-24 | 100% |
| url | hxxps://my-googlemeeting.com/download.php | payload_delivery | 2026-04-24 | 100% |
| url | hxxps://my-googlemeeting.com/microsoft-store.html | payload_delivery | 2026-04-24 | 100% |
| domain | my-googlemeeting.com | payload_delivery | 2026-04-24 | 100% |
| url | hxxp://172[.]94[.]9[.]44/build2.exe | payload_delivery | 2026-04-24 | 100% |
| url | hxxp://172[.]94[.]9[.]44/build.exe | payload_delivery | 2026-04-24 | 100% |
| url | hxxp://172[.]94[.]9[.]44/1.txt | payload_delivery | 2026-04-24 | 100% |
| url | hxxp://172[.]94[.]9[.]44/2.txt | payload_delivery | 2026-04-24 | 100% |
| url | hxxps://www.document-share-id382929992933.sisregcel.com | payload_delivery | 2026-04-24 | 100% |
// Hunt for network connections to known malicious IPs
// Source: ThreatFox - Unknown malware
let malicious_ips = dynamic(["206.82.6.110", "154.9.237.158", "178.16.52.101"]);
CommonSecurityLog
| where DestinationIP in (malicious_ips) or SourceIP in (malicious_ips)
| project TimeGenerated, SourceIP, DestinationIP, DestinationPort, DeviceAction, Activity
| order by TimeGenerated desc
// Hunt in Defender for Endpoint network events
let malicious_ips = dynamic(["206.82.6.110", "154.9.237.158", "178.16.52.101"]);
DeviceNetworkEvents
| where RemoteIP in (malicious_ips)
| project Timestamp, DeviceName, RemoteIP, RemotePort, InitiatingProcessFileName, ActionType
| order by Timestamp desc
// Hunt for DNS queries to known malicious domains
// Source: ThreatFox - Unknown malware
let malicious_domains = dynamic(["jsonapi.biz", "jsonserv.biz", "jsonserv.xyz", "cloudfront-021.s3.us-west-2.amazonaws.com", "domainaudit.checkmarx.cx", "audit.checkmarx.cx", "mymeetingtoday.com", "mymeetinggoogle.com", "livemeetgooogle.com", "my-googlemeeting.com", "document-share-id382929992933.sisregcel.com", "clang-outrag.digital"]);
DnsEvents
| where Name has_any (malicious_domains)
| project TimeGenerated, Computer, Name, IPAddresses, QueryType
| order by TimeGenerated desc
// Hunt for access to known malicious URLs
// Source: ThreatFox - Unknown malware
let malicious_urls = dynamic(["https://audit.checkmarx.cx/v1/telemetry", "https://api.github.com/search/commits?q=beautifulcastle", "https://mymeetingtoday.com/download.php", "https://mymeetingtoday.com/microsoft-store.html", "https://mymeetinggoogle.com/download.php", "https://mymeetinggoogle.com/microsoft-store.html", "https://livemeetgooogle.com/metro/download.php", "https://livemeetgooogle.com/microsoft-store.html", "https://my-googlemeeting.com/download.php", "https://my-googlemeeting.com/microsoft-store.html", "http://172.94.9.44/build2.exe", "http://172.94.9.44/build.exe", "http://172.94.9.44/1.txt", "http://172.94.9.44/2.txt", "https://www.document-share-id382929992933.sisregcel.com", "https://clang-outrag.digital/script.sh", "https://dhnsdns.beer/api/index.php", "https://dhnsdns.beer/api/7z.exe", "http://206.82.6.110:8888/supershell/login/", "https://claude-desktop.gitlab.io/dev/"]);
UrlClickEvents
| where Url has_any (malicious_urls)
| project Timestamp, AccountUpn, Url, ActionType, IsClickedThrough
| order by Timestamp desc
// Hunt for files matching known malicious hashes
// Source: ThreatFox - Unknown malware
let malicious_hashes = dynamic(["b25dedf5906840ddb19f96c27fae06abb08872b4b931466cc63ac1e9436b1270"]);
DeviceFileEvents
| where SHA256 in (malicious_hashes) or SHA1 in (malicious_hashes) or MD5 in (malicious_hashes)
| project Timestamp, DeviceName, FileName, FolderPath, SHA256, InitiatingProcessFileName
| order by Timestamp desc
| Sentinel Table | Notes |
|---|---|
CommonSecurityLog | Ensure this data connector is enabled |
DeviceFileEvents | Ensure this data connector is enabled |
DeviceNetworkEvents | Ensure this data connector is enabled |
DnsEvents | Ensure this data connector is enabled |
UrlClickEvents | Ensure this data connector is enabled |
Scenario: A system administrator is using PowerShell to run a scheduled job that downloads a legitimate software update from a known internal repository.
Filter/Exclusion: Exclude any IOCs that match internal IP ranges or domains used by the company’s software update servers.
Scenario: A DevOps engineer is using Ansible to deploy a new application, which includes copying files from a shared network drive (e.g., \\fileserver\shared\app-release).
Filter/Exclusion: Exclude IOCs that match internal file server paths or UNC paths used in the organization’s infrastructure.
Scenario: A database administrator is using SQL Server Agent to run a nightly backup job that writes to a local directory (e.g., C:\Backups\).
Filter/Exclusion: Exclude IOCs that match local system directories or paths used by standard backup processes.
Scenario: A security analyst is using Wireshark to capture network traffic for a forensic investigation, which includes exporting packets to a local folder (e.g., C:\Temp\pcap_files).
Filter/Exclusion: Exclude IOCs that match known user directories or temporary folders used by forensic tools.
Scenario: A system administrator is using Windows Task Scheduler to run a script that connects to a public cloud storage service (e.g., AWS S3 bucket) to sync configuration files.
Filter/Exclusion: Exclude IOCs that match known cloud storage endpoints or credentials used for legitimate configuration management.