SigmaHQ/rules/windows/malware/av_exploiting.yml

39 lines
976 B
YAML
Raw Normal View History

title: Antivirus Exploitation Framework Detection
2019-11-12 22:12:27 +00:00
id: 238527ad-3c2c-4e4f-a1f6-92fd63adb864
description: Detects a highly relevant Antivirus alert that reports an exploitation framework
date: 2018/09/09
modified: 2019/01/16
author: Florian Roth
references:
- https://www.nextron-systems.com/2018/09/08/antivirus-event-analysis-cheat-sheet-v1-4/
tags:
2018-09-20 10:44:44 +00:00
- attack.execution
- attack.t1203
2018-09-20 10:44:44 +00:00
- attack.command_and_control
- attack.t1219
logsource:
product: antivirus
detection:
selection:
2021-04-05 22:05:35 +00:00
Signature|contains:
2020-10-15 19:11:24 +00:00
- "MeteTool"
- "MPreter"
- "Meterpreter"
- "Metasploit"
- "PowerSploit"
- "CobaltSrike"
- "Swrort"
- "Rozena"
- "Backdoor.Cobalt"
2021-04-05 22:05:35 +00:00
- "CobaltStr"
- "COBEACON"
- "Cometer"
- "Razy"
condition: selection
fields:
- FileName
- User
falsepositives:
- Unlikely
level: critical