chore: move more rules
This commit is contained in:
@@ -0,0 +1 @@
|
||||
TBD
|
||||
@@ -0,0 +1 @@
|
||||
TBD
|
||||
@@ -0,0 +1 @@
|
||||
TBD
|
||||
+1
-1
@@ -3,7 +3,7 @@ id: 33a2d1dd-f3b0-40bd-8baf-7974468927cc
|
||||
status: test
|
||||
description: Detects an image load pattern as seen when a tool named PRIVATELOG is used and rarely observed under legitimate circumstances
|
||||
references:
|
||||
- https://www.fireeye.com/blog/threat-research/2021/09/unknown-actor-using-clfs-log-files-for-stealth.html
|
||||
- https://web.archive.org/web/20210901184449/https://www.fireeye.com/blog/threat-research/2021/09/unknown-actor-using-clfs-log-files-for-stealth.html
|
||||
author: Florian Roth (Nextron Systems)
|
||||
date: 2021/09/07
|
||||
modified: 2022/10/09
|
||||
@@ -0,0 +1 @@
|
||||
TBD
|
||||
@@ -0,0 +1 @@
|
||||
TBD
|
||||
@@ -0,0 +1 @@
|
||||
TBD
|
||||
@@ -0,0 +1 @@
|
||||
TBD
|
||||
@@ -0,0 +1 @@
|
||||
TBD
|
||||
@@ -1,12 +1,12 @@
|
||||
title: Domestic Kitten FurBall Malware Pattern
|
||||
id: 6c939dfa-c710-4e12-a4dd-47e1f10e68e1
|
||||
status: test
|
||||
status: deprecated
|
||||
description: Detects specific malware patterns used by FurBall malware linked to Iranian Domestic Kitten APT group
|
||||
references:
|
||||
- https://research.checkpoint.com/2021/domestic-kitten-an-inside-look-at-the-iranian-surveillance-operations/
|
||||
author: Florian Roth (Nextron Systems)
|
||||
date: 2021/02/08
|
||||
modified: 2022/10/09
|
||||
modified: 2023/04/20
|
||||
tags:
|
||||
- attack.command_and_control
|
||||
logsource:
|
||||
|
||||
Reference in New Issue
Block a user