SigmaHQ/rules/proxy/proxy_pwndrop.yml
2020-09-15 07:02:30 -06:00

29 lines
714 B
YAML

title: PwnDrp Access
id: 2b1ee7e4-89b6-4739-b7bb-b811b6607e5e
status: experimental
description: Detects downloads from PwnDrp web servers developed for red team testing and most likely also used for criminal activity
author: Florian Roth
date: 2020/04/15
modified: 2020/09/03
references:
- https://breakdev.org/pwndrop/
logsource:
category: proxy
detection:
selection:
c-uri|contains: '/pwndrop/'
condition: selection
fields:
- ClientIP
- c-uri
- c-useragent
falsepositives:
- Unknown
level: critical
tags:
- attack.command_and_control
- attack.t1071.001
- attack.t1043 # an old one
- attack.t1102.001
- attack.t1102.003
- attack.t1102 # an old one