EXPLORE
← Back to Explore
sublimemediumRule

Link: Commonly Abused Web Service redirecting to ZIP file

Detects messages containing links from URL shorteners, free file hosts, or suspicious domains that redirect to ZIP file downloads, potentially indicating malware distribution.

MITRE ATT&CK

defense-evasion

Detection Query

type.inbound
and 0 < length(body.links) < 15
and length(recipients.to) == 1
and recipients.to[0].email.domain.valid
and any(body.links,
        (
          // root domain is commonly abused
          .href_url.domain.root_domain in $url_shorteners
          or .href_url.domain.root_domain in $free_file_hosts
          or .href_url.domain.root_domain in $free_subdomain_hosts
          or .href_url.domain.root_domain in $self_service_creation_platform_domains
          or .href_url.domain.tld in $suspicious_tlds
          // or somewhat recently reg'd domain
          or network.whois(.href_url.domain).days_old < 30
        )
        // we DONT want the original link to end in zip
        and not strings.iends_with(.href_url.url, '.zip')
        // we DO want the effective (redirected) url to end in zip
        and strings.iends_with(ml.link_analysis(.).effective_url.url, '.zip')
)

Data Sources

Email MessagesEmail HeadersEmail Attachments

Platforms

email
Raw Content
name: "Link: Commonly Abused Web Service redirecting to ZIP file"
description: "Detects messages containing links from URL shorteners, free file hosts, or suspicious domains that redirect to ZIP file downloads, potentially indicating malware distribution."
type: "rule"
severity: "medium"
source: |
  type.inbound
  and 0 < length(body.links) < 15
  and length(recipients.to) == 1
  and recipients.to[0].email.domain.valid
  and any(body.links,
          (
            // root domain is commonly abused
            .href_url.domain.root_domain in $url_shorteners
            or .href_url.domain.root_domain in $free_file_hosts
            or .href_url.domain.root_domain in $free_subdomain_hosts
            or .href_url.domain.root_domain in $self_service_creation_platform_domains
            or .href_url.domain.tld in $suspicious_tlds
            // or somewhat recently reg'd domain
            or network.whois(.href_url.domain).days_old < 30
          )
          // we DONT want the original link to end in zip
          and not strings.iends_with(.href_url.url, '.zip')
          // we DO want the effective (redirected) url to end in zip
          and strings.iends_with(ml.link_analysis(.).effective_url.url, '.zip')
  )

attack_types:
  - "Malware/Ransomware"
tactics_and_techniques:
  - "Free file host"
  - "Free subdomain host"
  - "Open redirect"
  - "Evasion"
detection_methods:
  - "URL analysis"
  - "Whois"
  - "Archive analysis"
id: "a1132f52-101c-5675-baa2-fc14c49a2315"