Files
blue-team-tools/rules/windows/malware/av_exploiting.yml
T

35 lines
890 B
YAML
Raw Normal View History

2018-09-09 11:03:26 +02:00
title: Antivirus Exploitation Framework Detection
2019-11-12 23:12:27 +01:00
id: 238527ad-3c2c-4e4f-a1f6-92fd63adb864
2018-09-09 11:03:26 +02:00
description: Detects a highly relevant Antivirus alert that reports an exploitation framework
date: 2018/09/09
modified: 2019/01/16
2018-09-09 11:03:26 +02:00
author: Florian Roth
references:
- https://www.nextron-systems.com/2018/09/08/antivirus-event-analysis-cheat-sheet-v1-4/
tags:
2018-09-20 12:44:44 +02:00
- attack.execution
2018-09-09 11:03:26 +02:00
- attack.t1203
2018-09-20 12:44:44 +02:00
- attack.command_and_control
2018-09-09 11:03:26 +02:00
- attack.t1219
logsource:
product: antivirus
detection:
selection:
Signature:
- "*MeteTool*"
2019-02-22 15:22:10 +11:00
- "*MPreter*"
2018-09-09 11:03:26 +02:00
- "*Meterpreter*"
- "*Metasploit*"
- "*PowerSploit*"
- "*CobaltSrike*"
- "*Swrort*"
- "*Rozena*"
- '*Backdoor.Cobalt*'
2018-09-09 11:03:26 +02:00
condition: selection
fields:
- FileName
- User
falsepositives:
- Unlikely
level: critical