SigmaHQ/rules/apt/apt_carbonpaper_turla.yml
2018-07-25 09:50:01 +02:00

23 lines
602 B
YAML
Executable File

title: Turla Service Install
description: 'This method detects a service install of malicious services mentioned in Carbon Paper - Turla report by ESET'
references:
- https://www.welivesecurity.com/2017/03/30/carbon-paper-peering-turlas-second-stage-backdoor/
tags:
- attack.command_and_control
- attack.g0010
- attack.t1050
logsource:
product: windows
service: system
detection:
selection:
EventID: 7045
ServiceName:
- 'srservice'
- 'ipvpn'
- 'hkmsvc'
condition: selection
falsepositives:
- Unknown
level: high