SigmaHQ/rules/proxy/proxy_download_susp_tlds_whitelist.yml

66 lines
1.5 KiB
YAML
Raw Normal View History

2018-01-27 09:57:30 +00:00
title: Download EXE from Suspicious TLD
2019-11-12 22:12:27 +00:00
id: b5de2919-b74a-4805-91a7-5049accbaefe
2017-03-13 15:11:43 +00:00
status: experimental
description: Detects executable downloads from suspicious remote systems
2017-03-13 15:11:43 +00:00
author: Florian Roth
date: 2017/03/13
modified: 2020/09/03
2017-03-13 15:11:43 +00:00
logsource:
category: proxy
2017-03-13 15:11:43 +00:00
detection:
selection:
c-uri-extension:
- 'exe'
- 'vbs'
- 'bat'
- 'rar'
- 'ps1'
- 'doc'
- 'docm'
- 'xls'
- 'xlsm'
- 'pptm'
- 'rtf'
- 'hta'
- 'dll'
- 'ws'
- 'wsf'
- 'sct'
- 'zip'
# If you want to add more extensions - see https://docs.google.com/spreadsheets/d/1TWS238xacAto-fLKh1n5uTsdijWdCEsGIM0Y0Hvmc5g/
2017-03-13 15:11:43 +00:00
filter:
r-dns|endswith:
- '.com'
- '.org'
- '.net'
- '.edu'
- '.gov'
- '.uk'
- '.ca'
- '.de'
- '.jp'
- '.fr'
- '.au'
- '.us'
- '.ch'
- '.it'
- '.nl'
- '.se'
- '.no'
- '.es'
# Extend this list as needed
condition: selection and not filter
2017-09-12 21:54:04 +00:00
fields:
- ClientIP
2019-12-06 23:11:33 +00:00
- c-uri
2017-03-13 15:11:43 +00:00
falsepositives:
- All kind of software downloads
level: low
2020-09-15 13:02:30 +00:00
tags:
- attack.initial_access
- attack.t1566
- attack.execution
- attack.t1203
- attack.t1204.002
- attack.t1204 # an old one