← Back to SOC feed Coverage →

URLhaus: 32-bit Malicious URLs

ioc-hunt HIGH URLhaus
CommonSecurityLogDnsEvents
iocurlhaus
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at URLhaus →
Retrieved: 2026-04-24T09:00:00Z · Confidence: medium

Hunt Hypothesis

The detection identifies potential 32-bit malicious URLs sourced from URLhaus, which are commonly used in malware distribution campaigns. SOC teams should proactively hunt for these URLs in Azure Sentinel to identify and mitigate early-stage adversary activity before it leads to broader network compromise.

IOC Summary

Threat: 32-bit Total URLs: 40 Active URLs: 40

URLStatusThreatDate Added
hxxp://81.215.173.87:38020/bin.shonlinemalware_download2026-04-24
hxxp://182.112.254.225:45761/ionlinemalware_download2026-04-24
hxxp://123.12.245.177:37422/bin.shonlinemalware_download2026-04-24
hxxp://105.184.42.22:47025/ionlinemalware_download2026-04-24
hxxp://105.184.42.22:47025/bin.shonlinemalware_download2026-04-24
hxxp://117.217.33.124:43930/bin.shonlinemalware_download2026-04-24
hxxp://42.177.220.194:60093/ionlinemalware_download2026-04-24
hxxp://112.238.24.131:58597/ionlinemalware_download2026-04-24
hxxp://113.221.26.82:38224/ionlinemalware_download2026-04-24
hxxp://115.51.24.97:52088/bin.shonlinemalware_download2026-04-24
hxxp://113.221.26.82:38224/bin.shonlinemalware_download2026-04-24
hxxp://105.224.13.224:50631/bin.shonlinemalware_download2026-04-24
hxxp://103.206.205.54:60108/ionlinemalware_download2026-04-24
hxxp://112.248.102.197:53438/ionlinemalware_download2026-04-24
hxxp://103.206.205.54:60108/bin.shonlinemalware_download2026-04-24
hxxp://42.231.92.57:33007/ionlinemalware_download2026-04-24
hxxp://42.231.92.57:33007/bin.shonlinemalware_download2026-04-24
hxxp://112.248.102.197:53438/bin.shonlinemalware_download2026-04-24
hxxp://110.36.2.23:49916/bin.shonlinemalware_download2026-04-24
hxxp://61.53.116.176:39967/ionlinemalware_download2026-04-24
hxxp://105.225.26.202:39317/bin.shonlinemalware_download2026-04-24
hxxp://42.230.47.124:37365/ionlinemalware_download2026-04-24
hxxp://42.230.47.124:37365/bin.shonlinemalware_download2026-04-24
hxxp://61.53.116.176:39967/bin.shonlinemalware_download2026-04-24
hxxp://103.249.199.4:35727/ionlinemalware_download2026-04-24

KQL: Url Dns Hunt

// Hunt for DNS resolution of URLhaus malicious domains
// Threat: 32-bit
let malicious_domains = dynamic(["110.36.2.23", "105.224.13.224", "42.231.92.57", "115.51.24.97", "42.230.47.124", "113.221.26.82", "105.225.26.202", "102.132.17.242", "112.238.24.131", "182.112.254.225", "117.217.33.124", "103.206.205.54", "61.53.116.176", "42.177.220.194", "112.248.102.197", "182.113.192.42", "196.189.3.1", "103.249.199.4", "123.11.197.89", "105.184.42.22", "81.215.173.87", "123.12.245.177"]);
DnsEvents
| where Name has_any (malicious_domains)
| project TimeGenerated, Computer, Name, IPAddresses
| order by TimeGenerated desc

KQL: Url Proxy Hunt

// Hunt for web traffic to URLhaus malicious domains
let malicious_domains = dynamic(["110.36.2.23", "105.224.13.224", "42.231.92.57", "115.51.24.97", "42.230.47.124", "113.221.26.82", "105.225.26.202", "102.132.17.242", "112.238.24.131", "182.112.254.225", "117.217.33.124", "103.206.205.54", "61.53.116.176", "42.177.220.194", "112.248.102.197", "182.113.192.42", "196.189.3.1", "103.249.199.4", "123.11.197.89", "105.184.42.22", "81.215.173.87", "123.12.245.177"]);
CommonSecurityLog
| where RequestURL has_any (malicious_domains) or DestinationHostName has_any (malicious_domains)
| project TimeGenerated, SourceIP, RequestURL, DestinationHostName, DeviceAction
| order by TimeGenerated desc

Required Data Sources

Sentinel TableNotes
CommonSecurityLogEnsure this data connector is enabled
DnsEventsEnsure this data connector is enabled

References

False Positive Guidance

Original source: https://urlhaus.abuse.ch/