LoFP LoFP / t1567.002

t1567.002

TitleTags
dns queries for \"ufile\" are not malicious by nature necessarily. investigate the source to determine the necessary actions to take
large outbound transfers may occur due to legitimate activities such as cloud backups, file syncing, os or application updates, or developer build deployments. backup servers, ci/cd pipelines, and enterprise sync tools (e.g., onedrive, dropbox) may exhibit similar patterns. additional validation using user context, scheduled task windows, or endpoint telemetry is recommended to reduce false positives.
legitimate dns queries and usage of mega
legitimate mega installers and utilities are expected to communicate with this domain. exclude hosts that are known to be allowed to use this tool.
legitimate rclone usage
legitimate use of restic for backup purposes within the organization.
legitimate use of the api with a tool that the author wasn't aware of
legitimate users and applications may use these domains for benign purposes such as file transfers, collaborative development, or storing public content. developer tools, browser extensions, or open-source software may connect to githubusercontent.com or cdn.discordapp.com as part of normal operation. it is recommended to review the associated process (`eve_process`), user behavior, and frequency of access before classifying the activity as suspicious.
network admin or normal user may share files to customer and external team.
rare legitimate access to anonfiles.com
rclone is used legitimately in some backup or other workflows. tune this rule based on known-good operational usage or restrict by known user/service accounts an specific folders or remote names.
unknown
valid requests with this exact user agent to that is used by legitimate scripts or sysadmin operations