rule: BlackByte ransomware

This commit is contained in:
Florian Roth
2022-02-25 15:24:36 +01:00
parent b0b675b004
commit 7baf014421
@@ -0,0 +1,29 @@
title: BlackByte Ransomware Patterns
id: 999e8307-a775-4d5f-addc-4855632335be
status: experimental
description: This command line patterns found in BlackByte Ransomware operations
author: Florian Roth
references:
- https://redcanary.com/blog/blackbyte-ransomware/
date: 2022/02/25
logsource:
category: process_creation
product: windows
detection:
selection1:
Image|startswith: 'C:\Users\Public\'
CommandLine|endswith: ' -single'
selection2:
CommandLine|contains:
- 'del C:\Windows\System32\Taskmgr.exe'
- ';Set-Service -StartupType Disabled $'
- 'powershell -command "$x =[System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String('
- ' do start wordpad.exe /p '
condition: 1 of selection*
fields:
- ComputerName
- User
- CommandLine
falsepositives:
- Unknown
level: high