SigmaHQ/rules/windows/builtin/win_alert_mimikatz_keywords.yml

21 lines
572 B
YAML
Raw Normal View History

2018-01-27 09:57:30 +00:00
title: Mimikatz Use
description: This method detects mimikatz keywords in different Eventlogs (some of them only appear in older Mimikatz version that are however still used by different threat groups)
author: Florian Roth
logsource:
2017-02-19 10:08:23 +00:00
product: windows
2016-12-27 13:49:54 +00:00
detection:
keywords:
- mimikatz
- mimilib
- <3 eo.oe
- eo.oe.kiwi
- privilege::debug
- sekurlsa::logonpasswords
- lsadump::sam
2017-02-10 18:17:02 +00:00
- mimidrv.sys
condition: keywords
2016-12-27 13:49:54 +00:00
falsepositives:
- Naughty administrators
- Penetration test
2017-02-16 17:02:26 +00:00
level: critical