← Back to SOC feed Coverage →

ThreatFox: CobaltMirage FRP IOCs

ioc-hunt HIGH ThreatFox
CommonSecurityLogDeviceNetworkEvents
iocthreatfoxwin-cobaltmirage_tunnel
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at ThreatFox →
Retrieved: 2026-05-17T11:00:00Z · Confidence: high

Hunt Hypothesis

The detection identifies potential CobaltMirage FRP infrastructure activity through known malicious IOCs, indicating possible adversary persistence and command-and-control communication. SOC teams should proactively hunt for this behavior in Azure Sentinel to detect and mitigate early-stage compromise by advanced persistent threats leveraging FRP.

IOC Summary

Malware Family: CobaltMirage FRP Total IOCs: 10 IOC Types: ip:port

TypeValueThreat TypeFirst SeenConfidence
ip:port146[.]190[.]163[.]32:443botnet_cc2026-05-1790%
ip:port31[.]57[.]184[.]82:443botnet_cc2026-05-1795%
ip:port23[.]27[.]143[.]170:443botnet_cc2026-05-1790%
ip:port45[.]92[.]1[.]165:443botnet_cc2026-05-1795%
ip:port91[.]92[.]41[.]10:443botnet_cc2026-05-1795%
ip:port217[.]30[.]169[.]67:443botnet_cc2026-05-1790%
ip:port181[.]134[.]198[.]53:443botnet_cc2026-05-1790%
ip:port112[.]125[.]19[.]107:443botnet_cc2026-05-1795%
ip:port4[.]235[.]114[.]15:443botnet_cc2026-05-1795%
ip:port83[.]142[.]209[.]228:443botnet_cc2026-05-1795%

KQL: Ip Hunt

// Hunt for network connections to known malicious IPs
// Source: ThreatFox - CobaltMirage FRP
let malicious_ips = dynamic(["112.125.19.107", "91.92.41.10", "31.57.184.82", "217.30.169.67", "4.235.114.15", "23.27.143.170", "181.134.198.53", "146.190.163.32", "83.142.209.228", "45.92.1.165"]);
CommonSecurityLog
| where DestinationIP in (malicious_ips) or SourceIP in (malicious_ips)
| project TimeGenerated, SourceIP, DestinationIP, DestinationPort, DeviceAction, Activity
| order by TimeGenerated desc

KQL: Ip Hunt Device

// Hunt in Defender for Endpoint network events
let malicious_ips = dynamic(["112.125.19.107", "91.92.41.10", "31.57.184.82", "217.30.169.67", "4.235.114.15", "23.27.143.170", "181.134.198.53", "146.190.163.32", "83.142.209.228", "45.92.1.165"]);
DeviceNetworkEvents
| where RemoteIP in (malicious_ips)
| project Timestamp, DeviceName, RemoteIP, RemotePort, InitiatingProcessFileName, ActionType
| order by Timestamp desc

Required Data Sources

Sentinel TableNotes
CommonSecurityLogEnsure this data connector is enabled
DeviceNetworkEventsEnsure this data connector is enabled

References

False Positive Guidance

Original source: https://threatfox.abuse.ch/browse/malware/win.cobaltmirage_tunnel/