The deployment uses Suricata as an IDS, and when Suricata detects any issue, it triggers a rule, which in turn triggers an AR script. There are two steps to it:
- We run a query to Pastebin, and Suricata detects the user agent used as malicious. What is important here is the user agent and not the document on Pastebin.
- The Suricata rule then triggers URLHaus to scan the URL, and URLHaus sees "pastebin.com" and flags it as a domain used to deploy malware. Here, what is important is "pastebin.com" not the subdirectory, URLHaus will only check the TLD and not subdirectories.
In summary, the command should still work: