Skip to content

Conversation

@acd62081
Copy link

@acd62081 acd62081 commented Aug 3, 2019

I added a whitelist variable utlizing the urlsplit library which is already installed. This allows users an easy way to whitelist domains using the domain.txt file located in cwd/whitelist/. This signature caused misleading "hits "that require the analyst to spend large amounts of time sifting through legitimate URL's in order to find a malicious URL. This change allows users to add any whitelisted entries into the domain.txt file as an easy way to trim down the "noise".

Original Alert:
Malicious URL finding - Adobe

Added armmf.adobe.com to cwd/whitelist/domain.txt with nano:
domain_txt entries

New Alert:
Malicious URL finding - Adobe_after adding_armmf_adobe_com

Thank you.

This allows users an easy way to whitelist domains using the domain.txt file located in cwd/whitelist/.  This signature caused misleading "hits "that require the analyst to spend large amounts of time sifting through legitimate URL's in order to find a malicious URL.
Microsoft states that:
"Owner File (Same Directory as Source File)
When a previously saved file is opened for editing, for printing, or for review, Word creates a temporary file that has a .doc file name extension. This file name extension begins with a tilde (~) that is followed by a dollar sign ($) that is followed by the remainder of the original file name."
https://support.microsoft.com/en-us/help/211632/description-of-how-word-creates-temporary-files
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants