Skip to content

<<< Hide Navigation Hide TOC >>>

Discovery Using AzureHound (35b781cc-1a08-4a5a-80af-42fd7c315c6b)

Detects AzureHound (A BloodHound data collector for Microsoft Azure) activity via the default User-Agent that is used during its operation after successful authentication.

Galaxy ColorsSigma-Rule...Attack Pat...
Rows: 3
Loading extensions...
Collapse filters
Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators:
<, <=, >, >=, =, *, !, {, }, ||,&&, [empty], [nonempty], rgx:
Learn more

TableFilter v0.7.2

https://www.tablefilter.com/
©2015-2025 Max Guglielmi
?
Cluster A Galaxy A Cluster B Galaxy B Level
Discovery Using AzureHound (35b781cc-1a08-4a5a-80af-42fd7c315c6b) Sigma-Rules Cloud Service Discovery - T1526 (e24fcba8-2557-4442-a139-1ee2f2e784db) Attack Pattern 1
Discovery Using AzureHound (35b781cc-1a08-4a5a-80af-42fd7c315c6b) Sigma-Rules Cloud Account - T1087.004 (8f104855-e5b7-4077-b1f5-bc3103b41abe) Attack Pattern 1
Account Discovery - T1087 (72b74d71-8169-42aa-92e0-e7b04b9f5a08) Attack Pattern Cloud Account - T1087.004 (8f104855-e5b7-4077-b1f5-bc3103b41abe) Attack Pattern 2