Query Details
id: bd110a3e-7ef8-41c8-a9c6-5fe0f5c13aea
name: AzureKid BlackCat Security Module Activity
version: 1.0.0
kind: NRT
description: |-
This rule identifies HTTP requests made to the Microsoft Graph API where the 'UserAgent' string contains "BlackCat". This signature is associated with the AzureKid BlackCat PowerShell module, a security assessment and auditing tool designed to validate Microsoft Azure environment configurations and identify potential security risks.
While this tool is used for legitimate security testing, its presence in unexpected contexts may indicate unauthorized reconnaissance, internal auditing without change control, or a threat actor using open-source tools to map the Azure environment.
Reference: https://github.com/azurekid/blackcat
severity: Medium
tactics:
- Discovery
- Reconnaissance
relevantTechniques:
- T1087.004
- T1526
- T1082
- T1595
query: |-
MicrosoftGraphActivityLogs
| where UserAgent contains "BlackCat"
| where UserId != "5b58f023-df41-4ddf-a0e6-ea9161f7606d"
customDetails:
SessionId: SessionId
UniqueTokenId: SignInActivityId
entityMappings:
- entityType: IP
fieldMappings:
- identifier: Address
columnName: IPAddress
- entityType: CloudApplication
fieldMappings:
- identifier: AppId
columnName: AppId
suppressionEnabled: true
suppressionDuration: 5h
incidentConfiguration:
createIncident: true
groupingConfiguration:
enabled: true
reopenClosedIncident: false
lookbackDuration: 5h
matchingMethod: AllEntities
groupByEntities: []
groupByAlertDetails: []
groupByCustomDetails: []
eventGroupingSettings:
aggregationKind: SingleAlert
This query is designed to detect specific HTTP requests made to the Microsoft Graph API that include the term "BlackCat" in the 'UserAgent' string. The presence of "BlackCat" suggests the use of the AzureKid BlackCat PowerShell module, which is a tool for security assessment and auditing of Microsoft Azure environments. While this tool is typically used for legitimate security testing, its unexpected presence could indicate unauthorized activities or potential threats.
Key points of the query:
Overall, this query helps security teams monitor and respond to potential misuse of security tools within their Azure environment.

Fabian Bader
Released: February 5, 2026
Tables
Keywords
Operators