← Back to SOC feed Coverage →

URLhaus: ClearFake Malicious URLs

ioc-hunt HIGH URLhaus
CommonSecurityLogDnsEvents
iocurlhaus
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at URLhaus →
Retrieved: 2026-04-25T09:00:00Z · Confidence: medium

Hunt Hypothesis

The ClearFake malware uses malicious URLs from URLhaus to establish command-and-control communication for data exfiltration. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate potential data breaches early.

IOC Summary

Threat: ClearFake Total URLs: 33 Active URLs: 33

URLStatusThreatDate Added
hxxps://serven5um.nov3liren.in.net/cdk-msdn-3457325-null/load-file0dsdf567.chkonlinemalware_download2026-04-25
hxxps://vor-spireos.nov3liren.in.net/cdk-msdn-3457325-null/load-file0dsdf567.chkonlinemalware_download2026-04-25
hxxps://atom1-span.nov3liren.in.net/cdk-msdn-3457325-null/load-file0dsdf567.chkonlinemalware_download2026-04-25
hxxps://emidb.kymle1rax.in.net/cdk-msdn-3457325-null/load-file0dsdf567.chkonlinemalware_download2026-04-25
hxxps://geo-1c3.kymle1rax.in.net/cdk-msdn-3457325-null/load-file0dsdf567.chkonlinemalware_download2026-04-25
hxxps://veltide4a.kymle1rax.in.net/cdk-msdn-3457325-null/load-file0dsdf567.chkonlinemalware_download2026-04-25
hxxps://thick8-signal.kymle1rax.in.net/cdk-msdn-3457325-null/load-file0dsdf567.chkonlinemalware_download2026-04-25
hxxps://tercheck.kymle1rax.in.net/cdk-msdn-3457325-null/load-file0dsdf567.chkonlinemalware_download2026-04-25
hxxps://inkraven.kymle1rax.in.net/cdk-msdn-3457325-null/load-file0dsdf567.chkonlinemalware_download2026-04-25
hxxps://ash-leaf.to9varon.in.net/cdk-msdn-3457325-null/load-file0dsdf567.chkonlinemalware_download2026-04-25
hxxps://neo-cornput.to9varon.in.net/cdk-msdn-3457325-null/load-file0dsdf567.chkonlinemalware_download2026-04-25
hxxps://bytefore.to9varon.in.net/cdk-msdn-3457325-null/load-file0dsdf567.chkonlinemalware_download2026-04-25
hxxps://rntfvps.to9varon.in.net/cdk-msdn-3457325-null/load-file0dsdf567.chkonlinemalware_download2026-04-25
hxxps://atomicextract.to9varon.in.net/cdk-msdn-3457325-null/load-file0dsdf567.chkonlinemalware_download2026-04-25
hxxps://server-scar.to9varon.in.net/cdk-msdn-3457325-null/load-file0dsdf567.chkonlinemalware_download2026-04-25
hxxps://hdf358xa.sylo6mer.in.net/cdk-msdn-3457325-null/load-file0dsdf567.chkonlinemalware_download2026-04-25
hxxps://amber-mon.sylo6mer.in.net/cdk-msdn-3457325-null/load-file0dsdf567.chkonlinemalware_download2026-04-25
hxxps://gentl-snow.sylo6mer.in.net/cdk-msdn-3457325-null/load-file0dsdf567.chkonlinemalware_download2026-04-25
hxxps://25eap9f.sylo6mer.in.net/cdk-msdn-3457325-null/load-file0dsdf567.chkonlinemalware_download2026-04-25
hxxps://argrs.sylo6mer.in.net/cdk-msdn-3457325-null/load-file0dsdf567.chkonlinemalware_download2026-04-25
hxxps://vorlithen4.sylo6mer.in.net/cdk-msdn-3457325-null/load-file0dsdf567.chkonlinemalware_download2026-04-25
hxxps://sernexor8.rax4pavel.in.net/cdk-msdn-3457325-null/load-file0dsdf567.chkonlinemalware_download2026-04-25
hxxps://falforma.rax4pavel.in.net/cdk-msdn-3457325-null/load-file0dsdf567.chkonlinemalware_download2026-04-25
hxxps://forrn7-panel.rax4pavel.in.net/cdk-msdn-3457325-null/load-file0dsdf567.chkonlinemalware_download2026-04-25
hxxps://jkdraj.rax4pavel.in.net/cdk-msdn-3457325-null/load-file0dsdf567.chkonlinemalware_download2026-04-25

KQL: Url Dns Hunt

// Hunt for DNS resolution of URLhaus malicious domains
// Threat: ClearFake
let malicious_domains = dynamic(["veltide4a.kymle1rax.in.net", "tercheck.kymle1rax.in.net", "argrs.sylo6mer.in.net", "forrn7-panel.rax4pavel.in.net", "serven5um.nov3liren.in.net", "sernexor8.rax4pavel.in.net", "starwinter.rax4pavel.in.net", "falforma.rax4pavel.in.net", "sub-n3uron.zex8liron.in.net", "rntfvps.to9varon.in.net", "neo-cornput.to9varon.in.net", "jkdraj.rax4pavel.in.net", "thick8-signal.kymle1rax.in.net", "server-scar.to9varon.in.net", "inkraven.kymle1rax.in.net", "geo-1c3.kymle1rax.in.net", "hdf358xa.sylo6mer.in.net", "atom1-span.nov3liren.in.net", "dyn-tideis.zex8liron.in.net", "ultra-f1rmvva.zex8liron.in.net", "atomicextract.to9varon.in.net", "vellithal3.rax4pavel.in.net", "vor-spireos.nov3liren.in.net", "bytefore.to9varon.in.net", "gentl-snow.sylo6mer.in.net", "emidb.kymle1rax.in.net", "25eap9f.sylo6mer.in.net", "vorlithen4.sylo6mer.in.net", "amber-mon.sylo6mer.in.net", "ash-leaf.to9varon.in.net"]);
DnsEvents
| where Name has_any (malicious_domains)
| project TimeGenerated, Computer, Name, IPAddresses
| order by TimeGenerated desc

KQL: Url Proxy Hunt

// Hunt for web traffic to URLhaus malicious domains
let malicious_domains = dynamic(["veltide4a.kymle1rax.in.net", "tercheck.kymle1rax.in.net", "argrs.sylo6mer.in.net", "forrn7-panel.rax4pavel.in.net", "serven5um.nov3liren.in.net", "sernexor8.rax4pavel.in.net", "starwinter.rax4pavel.in.net", "falforma.rax4pavel.in.net", "sub-n3uron.zex8liron.in.net", "rntfvps.to9varon.in.net", "neo-cornput.to9varon.in.net", "jkdraj.rax4pavel.in.net", "thick8-signal.kymle1rax.in.net", "server-scar.to9varon.in.net", "inkraven.kymle1rax.in.net", "geo-1c3.kymle1rax.in.net", "hdf358xa.sylo6mer.in.net", "atom1-span.nov3liren.in.net", "dyn-tideis.zex8liron.in.net", "ultra-f1rmvva.zex8liron.in.net", "atomicextract.to9varon.in.net", "vellithal3.rax4pavel.in.net", "vor-spireos.nov3liren.in.net", "bytefore.to9varon.in.net", "gentl-snow.sylo6mer.in.net", "emidb.kymle1rax.in.net", "25eap9f.sylo6mer.in.net", "vorlithen4.sylo6mer.in.net", "amber-mon.sylo6mer.in.net", "ash-leaf.to9varon.in.net"]);
CommonSecurityLog
| where RequestURL has_any (malicious_domains) or DestinationHostName has_any (malicious_domains)
| project TimeGenerated, SourceIP, RequestURL, DestinationHostName, DeviceAction
| order by TimeGenerated desc

Required Data Sources

Sentinel TableNotes
CommonSecurityLogEnsure this data connector is enabled
DnsEventsEnsure this data connector is enabled

References

False Positive Guidance

Original source: https://urlhaus.abuse.ch/