2019-12-09 16:24:10 +00:00
title : Data Compressed - rar.exe
2019-11-12 23:12:27 +01:00
id : 6f3e2987-db24-4c78-a860-b4f4095a7095
2019-11-12 23:05:36 +01:00
status : experimental
2019-11-12 23:12:27 +01:00
description : An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount
of data sent over the network
2019-11-12 23:05:36 +01:00
author : Timur Zinniatullin, oscd.community
date : 2019 /10/21
modified : 2019 /11/04
references :
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1002/T1002.yaml
logsource :
category : process_creation
product : windows
detection :
selection :
Image|endswith : '\rar.exe'
CommandLine|contains|all :
- ' a '
- '-r'
condition : selection
fields :
- Image
- CommandLine
- User
- LogonGuid
- Hashes
- ParentProcessGuid
- ParentCommandLine
falsepositives :
- highly likely if rar is default archiver in the monitored environment
level : low
tags :
- attack.exfiltration
- attack.t1002