SigmaHQ/rules/windows/file_event/sysmon_redmimicry_winnti_filedrop.yml
2020-07-01 09:48:48 +02:00

24 lines
573 B
YAML

title: RedMimicry Winnti Playbook Dropped File
id: 130c9e58-28ac-4f83-8574-0a4cc913b97e
description: Detects actions caused by the RedMimicry Winnti playbook
references:
- https://redmimicry.com
author: Alexander Rausch
date: 2020/06/24
tags:
- attack.defense_evasion
- attack.t1027
logsource:
product: windows
category: file_event
detection:
selection:
TargetFilename|contains:
- gthread-3.6.dll
- sigcmm-2.4.dll
- \Windows\Temp\tmp.bat
condition: selection
falsepositives:
- Unknown
level: high