← Back to SOC feed Coverage →

ThreatFox: Unknown malware IOCs

ioc-hunt HIGH ThreatFox
DnsEventsUrlClickEvents
iocthreatfoxunknown
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at ThreatFox →
Retrieved: 2026-05-05T03:15:55Z · Confidence: high

Hunt Hypothesis

The ThreatFox: Unknown malware IOCs rule detects potential adversary activity involving previously unidentified malicious indicators, which could signal the presence of novel or zero-day threats. SOC teams should proactively hunt for these IOCs in Azure Sentinel to identify and mitigate emerging threats before they cause widespread damage.

IOC Summary

Malware Family: Unknown malware Total IOCs: 100 IOC Types: domain, url

TypeValueThreat TypeFirst SeenConfidence
urlhxxps://discord-verification.propayload_delivery2026-05-04100%
domaindiscord-verification.propayload_delivery2026-05-04100%
urlhxxps://elevatewiseai.compayload_delivery2026-05-04100%
domainelevatewiseai.compayload_delivery2026-05-04100%
urlhxxps://elevatenextai.compayload_delivery2026-05-04100%
domainelevatenextai.compayload_delivery2026-05-04100%
urlhxxps://elevateaiworld.compayload_delivery2026-05-04100%
domainelevateaiworld.compayload_delivery2026-05-04100%
urlhxxps://elevateaijourney.compayload_delivery2026-05-04100%
domainelevateaijourney.compayload_delivery2026-05-04100%
urlhxxps://egepenankara.compayload_delivery2026-05-04100%
domainegepenankara.compayload_delivery2026-05-04100%
urlhxxp://download.perlesimmo.compayload_delivery2026-05-04100%
domaindownload.perlesimmo.compayload_delivery2026-05-04100%
urlhxxps://mpolinkalternatif.compayload_delivery2026-05-04100%
domainmpolinkalternatif.compayload_delivery2026-05-04100%
urlhxxps://klik-adzkia.compayload_delivery2026-05-04100%
domainklik-adzkia.compayload_delivery2026-05-04100%
urlhxxps://darkwolfapp.compayload_delivery2026-05-04100%
domaindarkwolfapp.compayload_delivery2026-05-04100%
urlhxxps://cupangbiru007.xyzpayload_delivery2026-05-04100%
domaincupangbiru007.xyzpayload_delivery2026-05-04100%
urlhxxps://criptomaker.com.brpayload_delivery2026-05-04100%
domaincriptomaker.com.brpayload_delivery2026-05-04100%
urlhxxps://medikalmasoz.compayload_delivery2026-05-04100%

KQL: Domain Hunt

// Hunt for DNS queries to known malicious domains
// Source: ThreatFox - Unknown malware
let malicious_domains = dynamic(["discord-verification.pro", "elevatewiseai.com", "elevatenextai.com", "elevateaiworld.com", "elevateaijourney.com", "egepenankara.com", "download.perlesimmo.com", "mpolinkalternatif.com", "klik-adzkia.com", "darkwolfapp.com", "cupangbiru007.xyz", "criptomaker.com.br", "medikalmasoz.com", "usprediksi.com", "thehorrorvault.net", "teqwisefiji.com", "rizziaja.my.id", "resumodamoda.com", "krishnabiketech.in", "quotesgenerator.co", "fiveminuteschess.com", "club21ids.org", "beritaslotonline.com", "unikasegurancahumanizada.com.br", "tscrpos.xyz", "sawitgokil.com", "jacksonmemorial.net", "iiiemjobs.com", "financiallywellorganised.com", "empowermentleaders.com", "antlermotel.com.au", "ikebanamaldives.com", "cosconbd.com", "com.allteam-2.site", "cocomaya.com.bd", "clubinho.assessoriasalus.com.br", "club21idsofficial.com", "club21ids.space", "club21ids.online", "club21ids.co", "cloudflare-resolve-to.rossehijos.cl", "cloud01.bettafishstore.com", "clientesvpn.egbrewview.com", "ck-report.online", "ciruestetica.com", "busslercreate.com", "busslercraft.com", "busslerconsultancy.com", "busslercollective.com", "busslerbrand.com"]);
DnsEvents
| where Name has_any (malicious_domains)
| project TimeGenerated, Computer, Name, IPAddresses, QueryType
| order by TimeGenerated desc

KQL: Url Hunt

// Hunt for access to known malicious URLs
// Source: ThreatFox - Unknown malware
let malicious_urls = dynamic(["https://discord-verification.pro", "https://elevatewiseai.com", "https://elevatenextai.com", "https://elevateaiworld.com", "https://elevateaijourney.com", "https://egepenankara.com", "http://download.perlesimmo.com", "https://mpolinkalternatif.com", "https://klik-adzkia.com", "https://darkwolfapp.com", "https://cupangbiru007.xyz", "https://criptomaker.com.br", "https://medikalmasoz.com", "https://usprediksi.com", "https://thehorrorvault.net", "https://teqwisefiji.com", "https://rizziaja.my.id", "https://resumodamoda.com", "https://krishnabiketech.in", "https://quotesgenerator.co", "https://fiveminuteschess.com", "https://club21ids.org", "https://beritaslotonline.com", "https://unikasegurancahumanizada.com.br", "https://tscrpos.xyz", "https://sawitgokil.com", "https://jacksonmemorial.net", "https://iiiemjobs.com", "https://financiallywellorganised.com", "https://empowermentleaders.com"]);
UrlClickEvents
| where Url has_any (malicious_urls)
| project Timestamp, AccountUpn, Url, ActionType, IsClickedThrough
| order by Timestamp desc

Required Data Sources

Sentinel TableNotes
DnsEventsEnsure this data connector is enabled
UrlClickEventsEnsure this data connector is enabled

References

False Positive Guidance

Original source: https://threatfox.abuse.ch/browse/malware/unknown/