Download of New File Using Curl

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


Threat actors may use tools such as Curl to download additional files, communicate with C2 infrastructure, or exfiltrate data. This query looks for new files being downloaded using Curl.

Attribute Value
Type Hunting Query
Solution Endpoint Threat Protection Essentials
ID 7108c86b-a3ef-42d0-b50b-3e251fb1f84c
Tactics CommandAndControl
Techniques T1071
Required Connectors MicrosoftThreatProtection, SecurityEvents
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
DeviceNetworkEvents ?
SecurityEvent ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Hunting Queries · Back to Endpoint Threat Protection Essentials