Files
blue-team-tools/rules/application/antivirus/av_exploiting.yml
T
markus-nclose 4c2a3c3036 CobaltStrike typo
This typo keeps sneaking back in - critical for detection. 
Spelling correct according to https://www.nextron-systems.com/wp-content/uploads/2018/09/Antivirus_Event_Analysis_CheatSheet_1.5-2.pdf
2022-02-02 07:31:48 +02:00

40 lines
886 B
YAML

title: Antivirus Exploitation Framework Detection
id: 238527ad-3c2c-4e4f-a1f6-92fd63adb864
status: test
description: Detects a highly relevant Antivirus alert that reports an exploitation framework
author: Florian Roth
references:
- https://www.nextron-systems.com/2018/09/08/antivirus-event-analysis-cheat-sheet-v1-4/
date: 2018/09/09
modified: 2021/11/27
logsource:
product: antivirus
detection:
selection:
Signature|contains:
- 'MeteTool'
- 'MPreter'
- 'Meterpreter'
- 'Metasploit'
- 'PowerSploit'
- 'CobaltStrike'
- 'Swrort'
- 'Rozena'
- 'Backdoor.Cobalt'
- 'CobaltStr'
- 'COBEACON'
- 'Cometer'
- 'Razy'
condition: selection
fields:
- FileName
- User
falsepositives:
- Unlikely
level: critical
tags:
- attack.execution
- attack.t1203
- attack.command_and_control
- attack.t1219