← Back to SOC feed Coverage →

ThreatFox: Unknown Stealer IOCs

ioc-hunt HIGH ThreatFox
DnsEvents
infostealeriocthreatfoxunknown_stealer
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at ThreatFox →
Retrieved: 2026-04-21T09:00:00Z · Confidence: high

Hunt Hypothesis

The ThreatFox: Unknown Stealer IOCs rule detects potential adversary activity associated with a previously unknown stealer malware, likely used for exfiltrating sensitive data from compromised systems. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate early-stage compromise by an unknown threat actor leveraging stealthy, undetected IOCs.

IOC Summary

Malware Family: Unknown Stealer Total IOCs: 4 IOC Types: domain

TypeValueThreat TypeFirst SeenConfidence
domainfrostuploadv2.combotnet_cc2026-04-21100%
domainy5jcpyt1f2rgh0ig.frostapiv2.combotnet_cc2026-04-21100%
domainnxt8q5ekqgcimpwx.frostapiv2.combotnet_cc2026-04-21100%
domaindownex.frostapiv2.combotnet_cc2026-04-21100%

KQL: Domain Hunt

// Hunt for DNS queries to known malicious domains
// Source: ThreatFox - Unknown Stealer
let malicious_domains = dynamic(["frostuploadv2.com", "y5jcpyt1f2rgh0ig.frostapiv2.com", "nxt8q5ekqgcimpwx.frostapiv2.com", "downex.frostapiv2.com"]);
DnsEvents
| where Name has_any (malicious_domains)
| project TimeGenerated, Computer, Name, IPAddresses, QueryType
| order by TimeGenerated desc

Required Data Sources

Sentinel TableNotes
DnsEventsEnsure this data connector is enabled

References

False Positive Guidance

Original source: https://threatfox.abuse.ch/browse/malware/unknown_stealer/