Files
blue-team-tools/rules/windows/process_creation/win_susp_ping_hex_ip.yml
T

27 lines
717 B
YAML
Raw Normal View History

title: Ping Hex IP
2019-11-12 23:12:27 +01:00
id: 1a0d4aba-7668-4365-9ce4-6d79ab088dfd
description: Detects a ping command that uses a hex encoded IP address
references:
2019-03-02 00:14:20 +01:00
- https://github.com/vysec/Aggressor-VYSEC/blob/master/ping.cna
- https://twitter.com/vysecurity/status/977198418354491392
author: Florian Roth
date: 2018/03/23
2019-03-06 00:16:40 +01:00
tags:
- attack.defense_evasion
- attack.t1140
- attack.t1027
logsource:
2019-03-02 00:14:20 +01:00
category: process_creation
product: windows
detection:
2019-03-02 00:14:20 +01:00
selection:
CommandLine:
- '*\ping.exe 0x*'
- '*\ping 0x*'
condition: selection
fields:
2019-03-02 00:14:20 +01:00
- ParentCommandLine
falsepositives:
2019-03-02 00:14:20 +01:00
- Unlikely, because no sane admin pings IP addresses in a hexadecimal form
level: high