Detection rules › Sigma

Network Connection Initiated To Mega.nz

Severity
low
Author
Florian Roth (Nextron Systems)
Source
upstream

Detects a network connection initiated by a binary to "api.mega.co.nz". Attackers were seen abusing file sharing websites similar to "mega.nz" in order to upload/download additional payloads.

MITRE ATT&CK coverage

TacticTechniques
ExfiltrationT1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage

Event coverage

ProviderEvent IDTitle
Sysmon3Network connection

Stages and Predicates

Stage 1: selection

or:
DestinationHostname|endswith: mega.co.nz
DestinationHostname|endswith: mega.nz
Initiated: true

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
DestinationHostnameends_with
  • mega.co.nz corpus 4 (sigma 4)
  • mega.nz corpus 4 (sigma 4)
Initiatedeq
  • true corpus 40 (sigma 40)