Upload files to "/"
This commit is contained in:
236
ioc.md
Normal file
236
ioc.md
Normal file
@ -0,0 +1,236 @@
|
||||
## MD5
|
||||
```
|
||||
f8df6cf748cc3cf7c05ab18e798b3e91,md5, info Stealer Implants,,,
|
||||
ef8c77dc451f6c783d2c4ddb726de111,md5, info Stealer Implants,,,
|
||||
de26f488328ea0436199c5f728ecd82a,md5, info Stealer Implants,,,
|
||||
d4b75a8318befdb1474328a92f0fc79d,md5, info Stealer Implants,,,
|
||||
ba40c097e9d06130f366b86deb4a8124,md5, info Stealer Implants,,,
|
||||
b0844bb9a6b026569f9baf26a40c36f3,md5, info Stealer Implants,,,
|
||||
89052678dc147a01f3db76febf8441e4,md5, info Stealer Implants,,,
|
||||
842f8064a81eb5fc8828580a08d9b044,md5, info Stealer Implants,,,
|
||||
7c527c6607cc1bfa55ac0203bf395939,md5, info Stealer Implants,,,
|
||||
75fd9018433f5cbd2a4422d1f09b224e,md5, info Stealer Implants,,,
|
||||
729c24cc6a49fb635601eb88824aa276,md5, info Stealer Implants,,,
|
||||
69f6dcdb3d87392f300e9052de99d7ce,md5, info Stealer Implants,,,
|
||||
5e17d1a077f86f7ae4895a312176eba6,md5, info Stealer Implants,,,
|
||||
373ebf513d0838e1b8c3ce2028c3e673,md5, info Stealer Implants,,,
|
||||
351260c2873645e314a889170c7a7750,md5, info Stealer Implants,,,
|
||||
23ce22596f1c7d6db171753c1d2612fe,md5, info Stealer Implants,,,
|
||||
0c03efd969f6d9e6517c300f8fd92921,md5, info Stealer Implants,,,
|
||||
277acb857f1587221fc752f19be27187,md5, info Stealer Implants,,,
|
||||
faa47ecbcc846bf182e4ecf3f190a9f4,md5, info Stealer Payload,,,
|
||||
d8c6199b414bdf298b6a774e60515ba5,md5, info Stealer Payload,,,
|
||||
9d3337f0e95ece531909e4c8d9f1cc55,md5, info Stealer Payload,,,
|
||||
6bd84dfb987f9c40098d12e3959994bc,md5, info Stealer Payload,,,
|
||||
6396908315d9147de3dff98ab1ee4cbe,md5, info Stealer Payload,,,
|
||||
1e210fcc47eda459998c9a74c30f394e,md5, info Stealer Payload,,,
|
||||
fe0438938eef75e090a38d8b17687357,md5, info Stealer Payload,,,
|
||||
e0f8d7ec2be638fbf3ddf8077e775b2d,md5, info Stealer Bait File,,,
|
||||
cdd4cfac3ffe891eac5fb913076c4c40,md5, info Stealer Bait File,,,
|
||||
b57b13e9883bbee7712e52616883d437,md5, info Stealer Bait File,,,
|
||||
a3f4e422aecd0547692d172000e4b9b9,md5, info Stealer Bait File,,,
|
||||
9871272af8b06b484f0529c10350a910,md5, info Stealer Bait File,,,
|
||||
97b19d9709ed3b849d7628e2c31cdfc4,md5, info Stealer Bait File,,,
|
||||
8e960334c786280e962db6475e0473ab,md5, info Stealer Bait File,,,
|
||||
76e7cbab1955faa81ba0dda824ebb31d,md5, info Stealer Bait File,,,
|
||||
7140dbd0ca6ef09c74188a41389b0799,md5, info Stealer Bait File,,,
|
||||
5c3394e37c3d1208e499abe56e4ec7eb,md5, info Stealer Bait File,,,
|
||||
47765d12f259325af8acda48b1cbad48,md5, info Stealer Bait File,,,
|
||||
3e6cf927c0115f76ccf507d2f5913e02,md5, info Stealer Bait File,,,
|
||||
32da6c4a44973a5847c4a969950fa4c4,md5, info Stealer Bait File,,,
|
||||
fea50d3bb695f6ccc5ca13834cdfe298,md5, Lumma Stealer,,,
|
||||
83ae58dd03f33d1fae6771e859200be6,md5, Lumma Stealer,,,
|
||||
7b1f43deed8fc7e35f8394548e12dd81,md5, Lumma Stealer,,,
|
||||
c39f64a31e9f15338f83411bb9fc0942,md5, Lumma Stealer,,,
|
||||
b832096cf669ff4d66e04b252cb1a1dc,md5, Lumma Stealer,,,
|
||||
d6ea5dcdb2f88a65399f87809f43f83c,md5, erefgojgbu - CRYPTBOT,,,
|
||||
307f40ebc6d8a207455c96d34759f1f3,md5, L2.zip - CRYPTBOT,,,
|
||||
d8e21ac76b228ec144217d1e85df2693,md5, Sеtup.exe - CRYPTBOT,,,
|
||||
43939986a671821203bf9b6ba52a51b4,md5, oqnhustu - LUMMAC.V2,,,
|
||||
58c4ba9385139785e9700898cb097538,md5, WebView2Loader.dll - LUMMAC.V2,,,
|
||||
95361f5f264e58d6ca4538e7b436ab67,md5, Downloader - PEAKLIGHT,,,
|
||||
b716a1d24c05c6adee11ca7388b728d3,md5, Downloader - PEAKLIGHT,,,
|
||||
b15bac961f62448c872e1dc6d3931016,md5, Aaaa.exe - SHADOWLADDER,,,
|
||||
e7c43dc3ec4360374043b872f934ec9e,md5, bentonite.cfg - SHADOWLADDER,,,
|
||||
f98e0d9599d40ed032ff16de242987ca,md5, cymophane.doc - SHADOWLADDER,,,
|
||||
b6b8164feca728db02e6b636162a2960,md5, K1.zip - SHADOWLADDER,,,
|
||||
bb9641e3035ae8c0ab6117ecc82b65a1,md5, K1.zip - SHADOWLADDER,,,
|
||||
236c709bbcb92aa30b7e67705ef7f55a,md5, K2.zip - SHADOWLADDER,,,
|
||||
d7aff07e7cd20a5419f2411f6330f530,md5, K2.zip - SHADOWLADDER,,,
|
||||
a6c4d2072961e9a8c98712c46be588f8,md5, L1.zip - SHADOWLADDER,,,
|
||||
059d94e8944eca4056e92d60f7044f14,md5, LiteSkinUtils.dll - SHADOWLADDER,,,
|
||||
dfdc331e575dae6660d6ed3c03d214bd,md5, toughie.txt - SHADOWLADDER,,,
|
||||
47eee41b822d953c47434377006e01fe,md5, WCLDll.dll - SHADOWLADDER,,,
|
||||
```
|
||||
|
||||
## Sha256
|
||||
```
|
||||
b6a016ef240d94f86e20339c0093a8fa377767094276730acd96d878e0e1d624, sha256, Malware, PS, medium
|
||||
cc29f33c1450e19b9632ec768ad4c8c6adbf35adaa3e1de5e19b2213d5cc9a54, sha256, Malware, PS, medium
|
||||
632816db4e3642c8f0950250180dfffe3d37dca7219492f9557faf0ed78ced7c, sha256, Malware, ZIP, medium
|
||||
19d04a09e2b691f4fb3c2111d308dcfa2651328dfddef701d86c726dce4a334a, sha256, Malware, ZIP, medium
|
||||
d737637ee5f121d11a6f3295bf0d51b06218812b5ec04fe9ea484921e905a207, sha256, Malware, EXE, medium
|
||||
bbf7154f14d736f0c8491fb9fb44d2f179cdb02d34ab54c04466fa0702ea7d55, sha256, Malware, EXE, medium
|
||||
fa58022d69ca123cbc1bef13467d6853b2d55b12563afdbb81fc64b0d8a1d511, sha256, Malware, HTA, medium
|
||||
ed062c189419bca7d8c816bcdb1a150c7ca7dd1ad6e30e1f46fae0c10ab062ef, sha256, AntiSpam.exe, nan, medium
|
||||
d512bf205fb9d1c429a7f11f3b720c74680ea88b62dda83372be8f0de1073a08, sha256, AntiSpam.exe, nan, medium
|
||||
dc5c9310a2e6297caa4304002cdfb6fbf7d6384ddbd58574f77a411f936fab0b, sha256, AntiSpam.exe, nan, medium
|
||||
24b6ddd3028c28d0a13da0354333d19cbc8fd12d4351f083c8cb3a93ec3ae793, sha256, , nan, medium
|
||||
9c1e0c8c5b9b9fe9d0aa533fb7d9d1b57db98fd70c4f66a26a3ed9e06ac132a7, sha256, , nan, medium
|
||||
ac22ab152ed2e4e7b4cd1fc3025b58cbcd8d3d3ae3dbc447223dd4eabb17c45c, sha256, update6.exe Used, nan, medium
|
||||
ab1f101f6cd7c0cffc65df720b92bc8272f82a1e13f207dff21caaff7675029f, sha256, update7.exe, nan, medium
|
||||
9ED2B4D88B263F5078003EF35654ED5C205AC2F2C0E9225D4CDB4C24A5EA9AF2, sha256, update8.exe, nan, medium
|
||||
ab3daec39332ddeeba64a2f1916e6336a36ffcc751554954511121bd699b0caa, sha256, atiumdag.dll, nan, medium
|
||||
7d96ec8b72015515c4e0b5a1ae6c799801cf7b86861ade0298a372c7ced5fd93, sha256, Log.dll., nan, medium
|
||||
9dc809b2e5fbf38fa01530609ca7b608e2e61bd713145f84cf22c68809aec372, sha256, proxy, nan, medium
|
||||
fb4fa180a0eee68c06c85e1e755f423a64aa92a3ec6cf76912606ac253973506, sha256, , PS, medium
|
||||
fcf59559731574c845e42cd414359067e73fca108878af3ace99df779d48cbc3, sha256, , nan, medium
|
||||
949faad2c2401eb854b9c32a6bb6e514ad075e5cbe96154c172f5f6628af43ed, sha256, , nan, medium
|
||||
b92cf617a952f0dd2c011d30d8532d895c0cfbfd9556f7595f5b220e99d14d64, sha256, update2.dll , nan, medium
|
||||
cff5c6694d8925a12ce13a85e969bd468e28313af2fb46797bdcf77092012732, sha256, APEXScan.exe , nan, medium
|
||||
cb03b206d63be966ddffa7a2115ea99f9fec50d351dce03dff1240bb073b5b50, sha256, unnamed , nan, medium
|
||||
ccaa8c8b39cb4a4de4944200936bcd4796367c16421a89e6a7d5476ae2da78cd, sha256, update1.exe , nan, medium
|
||||
1ade6a15ebcbe8cb9bda1e232d7e4111b808fd4128e0d5db15bfafafc3ec7b8e, sha256, update4.exe , nan, medium
|
||||
ce1f44a677d9b7d1d62373175f5583d9e8c04e16ebd94656e21aa296e00e93d7, sha256, lu2.exe , nan, medium
|
||||
```
|
||||
|
||||
|
||||
## IPs
|
||||
```
|
||||
77.73.134.68,ip_address, Lumma Stealer
|
||||
144.76.173.247,ip_address, Lumma Stealer
|
||||
157.90.248.179,ip_address, Lumma Stealer
|
||||
213.252.244.62,ip_address, Lumma Stealer
|
||||
45.155.249.97,ip_address, Cobalt Strike C2 IP address
|
||||
77.238.224.56,ip_address, C2 address
|
||||
77.238.229.63,ip_address, C2 address
|
||||
77.238.250.123,ip_address, C2 address
|
||||
77.238.245.233,ip_address,C2 address
|
||||
91.142.74.28,ip_address,C2 address
|
||||
191.142.74.28,ip_address,C2 address
|
||||
195.2.70.38,ip_address,C2 address
|
||||
37.221.126.202,ip_address,C2 address used by the threat actor to connect via Anydesk
|
||||
91.196.70.160,ip_address, Socks proxy server
|
||||
217.15.175.191,ip_address, SystemBC C2 IP address
|
||||
```
|
||||
|
||||
|
||||
## Domains
|
||||
```
|
||||
testdomain123123.shop, domain, maliciousmd5, infoStealers
|
||||
savefrom.net, domain,streamingmd5, infoStealers
|
||||
unblocked.watch, domain,streamingmd5, infoStealers
|
||||
mp3fromlink.com, domain,streamingmd5, infoStealers
|
||||
hisotv.com, domain,streamingmd5, infoStealers
|
||||
www.portalmovies.com.ar, domain,streamingmd5, infoStealers
|
||||
sfrom.net, domain,streamingmd5, infoStealers
|
||||
tagalogdubbed.com, domain,streamingmd5, infoStealers
|
||||
www.youtubepp.com, domain,streamingmd5, infoStealers
|
||||
ssyoutube.com, domain,streamingmd5, infoStealers
|
||||
www.y2mate.com, domain,streamingmd5, infoStealers
|
||||
Multicanais.love, domain,streamingmd5, infoStealers
|
||||
averageorganicfallfaw.shop, domain, Command Servers -md5, infoStealers
|
||||
distincttangyflippan.shop, domain, Command Servers -md5, infoStealers
|
||||
macabrecondfucews.shop, domain, Command Servers -md5, infoStealers
|
||||
greentastellesqwm.shop, domain, Command Servers -md5, infoStealers
|
||||
stickyyummyskiwffe.shop, domain, Command Servers -md5, infoStealers
|
||||
sturdyregularrmsnhw.shop, domain, Command Servers -md5, infoStealers
|
||||
lamentablegapingkwaq.shop, domain, Command Servers -md5, infoStealers
|
||||
Innerverdanytiresw.shop, domain, Command Servers -md5, infoStealers
|
||||
standingcomperewhitwo.shop, domain, Command Servers -md5, infoStealers
|
||||
uniedpureevenywjk.shop, domain, samples -md5, infoStealers
|
||||
spotlessimminentys.shop, domain, samples -md5, infoStealers
|
||||
specialadventurousw.shop, domain, samples -md5, infoStealers
|
||||
stronggemateraislw.shop, domain, samples -md5, infoStealers
|
||||
willingyhollowsk.shop, domain, samples -md5, infoStealers
|
||||
handsomelydicrwop.shop, domain, samples -md5, infoStealers
|
||||
softcallousdmykw.shop, domain, samples -md5, infoStealers
|
||||
celebratioopz.shop, domain, Lumma Stealer, infoStealers
|
||||
writerospzm.shop, domain, Lumma Stealer, infoStealers
|
||||
deallerospfosu.shop, domain, Lumma Stealer, infoStealers
|
||||
bassizcellskz.shop, domain, Lumma Stealer, infoStealers
|
||||
mennyudosirso.shop, domain, Lumma Stealer, infoStealers
|
||||
languagedscie.shop, domain, Lumma Stealer, infoStealers
|
||||
complaintsipzzx.shop, domain, Lumma Stealer, infoStealers
|
||||
quialitsuzoxm.shop, domain, Lumma Stealer, infoStealers
|
||||
relaxtionflouwerwi.shop, domain, LUMMAC.V2 C2s, infoStealers
|
||||
deprivedrinkyfaiir.shop, domain, LUMMAC.V2 C2s, infoStealers
|
||||
detailbaconroollyws.shop, domain, LUMMAC.V2 C2s, infoStealers
|
||||
messtimetabledkolvk.shop, domain, LUMMAC.V2 C2s, infoStealers
|
||||
considerrycurrentyws.shop, domain, LUMMAC.V2 C2s, infoStealers
|
||||
understanndtytonyguw.shop, domain, LUMMAC.V2 C2s, infoStealers
|
||||
patternapplauderw.shop, domain, LUMMAC.V2 C2s, infoStealers
|
||||
horsedwollfedrwos.shop, domain, LUMMAC.V2 C2s, infoStealers
|
||||
tropicalironexpressiw.shop, domain, LUMMAC.V2 C2s, infoStealers
|
||||
falseaudiencekd.shop, domain,Lumma C2 domain, infoStealers
|
||||
feighminoritsjda.shop, domain,Lumma C2 domain, infoStealers
|
||||
justifycanddidatewd.shop, domain,Lumma C2 domain, infoStealers
|
||||
marathonbeedksow.shop, domain,Lumma C2 domain, infoStealers
|
||||
pleasurenarrowsdla.shop, domain,Lumma C2 domain, infoStealers
|
||||
raiseboltskdlwpow.shop, domain,Lumma C2 domain, infoStealers
|
||||
richardflorespoew.shop, domain,Lumma C2 domain, infoStealers
|
||||
strwawrunnygjwu.shop, domain,Lumma C2 domain, infoStealers
|
||||
https://ch3.dlvideosfre.click/human-verify-system.html, domain, Lumma Stealer, infoStealers
|
||||
https://verif.dlvideosfre.click/2ndhsoru, domain, Lumma Stealer, infoStealers
|
||||
https://verif.dlvideosfre.click/K1.zip, domain, Lumma Stealer, infoStealers
|
||||
https://verif.dlvideosfre.click/K2.zip, domain, Lumma Stealer, infoStealers
|
||||
https://verif.dlvideosfre.click, domain, Lumma Stealer, infoStealers
|
||||
Ofsetvideofre.click/, domain, Fake Captcha Websites, infoStealers
|
||||
Newvideozones.click/veri.html, domain, Fake Captcha Websites, infoStealers
|
||||
Clickthistogo.com/go/67fe87ca-a2d4-48ae-9352-c5453156df67?var_3=F60A0050-6F56-11EF-AA98-FFC33B7D3D59, domain, Fake Captcha Websites, infoStealers
|
||||
Downloadstep.com/go/08a742f2-0a36-4a00-a979-885700e3028c, domain, Fake Captcha Websites, infoStealers
|
||||
Betterdirectit.com/, domain, Fake Captcha Websites, infoStealers
|
||||
Betterdirectit.com/go/67fe87ca-a2d4-48ae-9352-c5453156df67, domain, Fake Captcha Websites, infoStealers
|
||||
heroic-genie-2b372e.netlify.app/please-verify-z.html, domain, Fake Captcha Websites, infoStealers
|
||||
Downloadstep.com/go/79553157-f8b8-440b-ae81-0d81d8fa17c4, domain, Fake Captcha Websites, infoStealers
|
||||
Downloadsbeta.com/go/08a742f2-0a36-4a00-a979-885700e3028c, domain, Fake Captcha Websites, infoStealers
|
||||
Streamingsplays.com/go/6754805d-41c5-46b7-929f-6655b02fce2c, domain, Fake Captcha Websites, infoStealers
|
||||
Streamingsplays.com/go/b11f973d-01d4-4a5b-8af3-139daaa5443f, domain, Fake Captcha Websites, infoStealers
|
||||
Streamingszone.com/go/b3ddd860-89c0-448c-937d-acf02f7a766f?c=AOsl62afSQUAEX4CAEJPFwASAAAAAABQ, domain, Fake Captcha Websites, infoStealers
|
||||
Streamingsplays.com/go/1c406539-b787-4493-a61b-f4ea31ffbd56, domain, Fake Captcha Websites, infoStealers
|
||||
github-scanner.shop/, domain, Fake Captcha Websites, infoStealers
|
||||
github-scanner.com/, domain, Fake Captcha Websites, infoStealers
|
||||
botcheck.b-cdn.net/captcha-verify-v7.html, domain, Fake Captcha Websites, infoStealers
|
||||
Rungamepc.ru/?load=Black-Myth-Wukong-crack, domain, Redirectingmd5, infoStealers
|
||||
game02-com.ru/?load=Cities-Skylines-2-Crack-Setup, domain, Redirectingmd5, infoStealers
|
||||
Rungamepc.ru/?load=Dragons-Dogma-2-Crack, domain, Redirectingmd5, infoStealers
|
||||
Rungamepc.ru/?load=Dying-Light-2-Crack, domain, Redirectingmd5, infoStealers
|
||||
Rungamepc.ru/?load=Monster-Hunter-Rise-Crack, domain, Redirectingmd5, infoStealers
|
||||
Runkit.com/wukong/black-myth-wukong-crack-pc, domain, Websites Containing Malicious URLsmd5, infoStealers
|
||||
Runkit.com/skylinespc/cities-skylines-ii-crack-pc-full-setup, domain, Websites Containing Malicious URLsmd5, infoStealers
|
||||
Runkit.com/masterposte/dying-light-2-crack-on-pc-denuvo-fix, domain, Websites Containing Malicious URLsmd5, infoStealers
|
||||
Runkit.com/dz4583276/monster-hunter-rise-crack-codex-pc/1.0.0/clone, domain, Websites Containing Malicious URLsmd5, infoStealers
|
||||
Groups.google.com/g/hogwarts-legacy-crack-empress, domain, Websites Containing Malicious URLsmd5, infoStealers
|
||||
By.tribuna.com/extreme/blogs/3143511-black-myth-wukong-full-unlock/, domain, Websites Containing Malicious URLsmd5, infoStealers
|
||||
https://human-check.b-cdn.net/verify-captcha-v7.html, domain, Lumma Stealer CAPTCHA, infoStealers
|
||||
https://poko.b-cdn.net/poko, domain,Lumma Stealer Mshta, infoStealers
|
||||
https://fatodex.b-cdn.net/fatodex, domain, PEAKLIGHT NBIsmd5, infoStealers
|
||||
https://matodown.b-cdn.net/matodown, domain, PEAKLIGHT NBIsmd5, infoStealers
|
||||
https://potexo.b-cdn.net/potexo, domain, PEAKLIGHT NBIsmd5, infoStealers
|
||||
hxxp://gceight8vt.top/upload.php, domain,CRYPTBOT C2s, infoStealers
|
||||
https://brewdogebar.com/code.vue, domain,CRYPTBOT C2s, infoStealers
|
||||
hxxp://62.133.61.56/Downloads/Full%20Video%20HD%20(1080p).lnk, domain,SHADOWLADDER, infoStealers
|
||||
https://fatodex.b-cdn.net/K1.zip, domain,SHADOWLADDER, infoStealers
|
||||
https://fatodex.b-cdn.net/K2.zip, domain,SHADOWLADDER, infoStealers
|
||||
https://forikabrof.click/flkhfaiouwrqkhfasdrhfsa.png, domain,SHADOWLADDER, infoStealers
|
||||
https://matodown.b-cdn.net/K1.zip, domain,SHADOWLADDER, infoStealers
|
||||
https://matodown.b-cdn.net/K2.zip, domain,SHADOWLADDER, infoStealers
|
||||
https://nextomax.b-cdn.net/L1.zip, domain,SHADOWLADDER, infoStealers
|
||||
https://nextomax.b-cdn.net/L2.zip, domain,SHADOWLADDER, infoStealers
|
||||
https://potexo.b-cdn.net/K1.zip, domain,SHADOWLADDER, infoStealers
|
||||
https://potexo.b-cdn.net/K2.zip, domain,SHADOWLADDER, infoStealers
|
||||
spamicrosoft.com, domain,Used to make external Microsoft Teams calls after email bombing users., infoStealers
|
||||
halagifts.com, domain,SystemBC C2 domain, infoStealers
|
||||
preservedmoment.com, domain,Cobalt Strike domain, infoStealers
|
||||
```
|
||||
|
||||
[1][2][3][4][5][6]
|
||||
|
||||
|
||||
|
||||
[1]: https://securelist.com/angry-likho-apt-attacks-with-lumma-stealer/115663/
|
||||
[2]: https://0xmrmagnezi.github.io/malware%20analysis/LummaStealer/
|
||||
[3]: https://www.mcafee.com/blogs/other-blogs/mcafee-labs/behind-the-captcha-a-clever-gateway-of-malware/
|
||||
[4]: https://denwp.com/dissecting-lumma-malware/
|
||||
[5]: https://cloud.google.com/blog/topics/threat-intelligence/peaklight-decoding-stealthy-memory-only-malware/
|
||||
[6]: https://www.rapid7.com/blog/post/2024/08/12/ongoing-social-engineering-campaign-refreshes-payloads/
|
710
rules.md
Normal file
710
rules.md
Normal file
@ -0,0 +1,710 @@
|
||||
# Rules for Info Stealers
|
||||
|
||||
|
||||
|
||||
[] Suspicious File Access and Modifications
|
||||
```
|
||||
`indextime` `sysmon` EventID=11 TargetFilename IN ("*\\Chrome\\User Data\\Default\\Cookies", "*\\Edge\\User Data\\Default\\Cookies", "*\\Chrome\\User Data\\Default\\History", "*\\Edge\\User Data\\Default\\History")
|
||||
| eval hash_sha256=lower(hash_sha256),
|
||||
hunting_trigger="Python decryption routine detected",
|
||||
mitre_category="Defense_Evasion",
|
||||
mitre_technique="Deobfuscate/Decode Files or Information",
|
||||
mitre_technique_id="T1140",
|
||||
mitre_subtechnique="",
|
||||
mitre_subtechnique_id="",
|
||||
apt="",
|
||||
mitre_link="https://attack.mitre.org/techniques/T1140/",
|
||||
creator="Cpl Iverson",
|
||||
last_tested=""),
|
||||
upload_date="2025-03-10",
|
||||
last_modify_date="2025-03-10",
|
||||
mitre_version="v16",
|
||||
priority="High"
|
||||
| `process_create_whitelist`
|
||||
| eval indextime = _indextime
|
||||
| convert ctime(indextime)
|
||||
| table _time indextime event_description hash_sha256 host_fqdn user_name original_file_name process_path process_guid process_parent_path process_id process_parent_id process_command_line process_parent_command_line process_parent_guid mitre_category mitre_technique mitre_technique_id hunting_trigger mitre_subtechnique mitre_subtechnique_id apt mitre_link last_tested creator upload_date last_modify_date mitre_version priority
|
||||
| collect `jarvis_index`
|
||||
```
|
||||
|
||||
[] Suspicious Process Execution
|
||||
```
|
||||
`indextime` `sysmon` EventID=1 Image="*python.exe" CommandLine="*decrypt_value*"
|
||||
| eval hash_sha256=lower(hash_sha256),
|
||||
hunting_trigger="Python decryption routine detected",
|
||||
mitre_category="Defense_Evasion",
|
||||
mitre_technique="Deobfuscate/Decode Files or Information",
|
||||
mitre_technique_id="T1140",
|
||||
mitre_subtechnique="",
|
||||
mitre_subtechnique_id="",
|
||||
apt="",
|
||||
mitre_link="https://attack.mitre.org/techniques/T1140/",
|
||||
creator="Cpl Iverson",
|
||||
last_tested=""),
|
||||
upload_date="2025-03-10",
|
||||
last_modify_date="2025-03-10",
|
||||
mitre_version="v16",
|
||||
priority="High"
|
||||
| `process_create_whitelist`
|
||||
| eval indextime = _indextime
|
||||
| convert ctime(indextime)
|
||||
| table _time indextime event_description hash_sha256 host_fqdn user_name original_file_name process_path process_guid process_parent_path process_id process_parent_id process_command_line process_parent_command_line process_parent_guid mitre_category mitre_technique mitre_technique_id hunting_trigger mitre_subtechnique mitre_subtechnique_id apt mitre_link last_tested creator upload_date last_modify_date mitre_version priority
|
||||
| collect `jarvis_index`
|
||||
```
|
||||
|
||||
[] Encoded Powershell command [1]
|
||||
```
|
||||
`indextime` `powershell` (process_name="powershell.exe" OR command_line="*powershell.exe*") AND (command_line="*-enc *" OR command_line="*-EncodedCommand *")
|
||||
| eval hash_sha256=lower(hash_sha256),
|
||||
hunting_trigger="INFOSTEALER - Encoded PowerShell command detected",
|
||||
mitre_category="Defense_Evasion",
|
||||
mitre_technique="Obfuscated Files or Information",
|
||||
mitre_technique_id="T1027",
|
||||
mitre_subtechnique="",
|
||||
mitre_subtechnique_id="",
|
||||
apt="",
|
||||
mitre_link="https://attack.mitre.org/techniques/T1027/",
|
||||
creator="Cpl Iverson",
|
||||
last_tested="",
|
||||
upload_date="2025-03-10",
|
||||
last_modify_date="2025-03-10"),
|
||||
mitre_version="v16",
|
||||
priority="High"
|
||||
| `process_create_whitelist`
|
||||
| eval indextime = _indextime
|
||||
| convert ctime(indextime)
|
||||
| table _time indextime event_description hash_sha256 host_fqdn user_name original_file_name process_path process_guid process_parent_path process_id process_parent_id process_command_line process_parent_command_line process_parent_guid mitre_category mitre_technique mitre_technique_id hunting_trigger mitre_subtechnique mitre_subtechnique_id apt mitre_link last_tested creator upload_date last_modify_date mitre_version priority
|
||||
| collect `jarvis_index`
|
||||
```
|
||||
|
||||
[] Hidden Powershell
|
||||
```
|
||||
`indextime` `powershell` (process_name="powershell.exe" OR command_line="*powershell.exe*") AND (command_line="*-W Hidden*" AND command_line="*Invoke-WebRequest*" AND command_line="*/uploads/*")
|
||||
| eval hash_sha256=lower(hash_sha256),
|
||||
hunting_trigger="INFOSTEALER - Suspicious PowerShell web download with hidden window",
|
||||
mitre_category="Command and Control",
|
||||
mitre_technique="Ingress Tool Transfer",
|
||||
mitre_technique_id="T1105",
|
||||
mitre_subtechnique="",
|
||||
mitre_subtechnique_id="",
|
||||
apt="",
|
||||
mitre_link="https://attack.mitre.org/techniques/T1105/",
|
||||
creator="Cpl Iverson",
|
||||
last_tested="",
|
||||
upload_date="2025-03-16",
|
||||
last_modify_date="2025-03-16",
|
||||
mitre_version="v16",
|
||||
priority="High"
|
||||
| `process_create_whitelist`
|
||||
| eval indextime = _indextime
|
||||
| convert ctime(indextime)
|
||||
| table _time indextime event_description hash_sha256 host_fqdn user_name original_file_name process_path process_guid process_parent_path process_id process_parent_id process_command_line process_parent_command_line process_parent_guid mitre_category mitre_technique mitre_technique_id hunting_trigger mitre_subtechnique mitre_subtechnique_id apt mitre_link last_tested creator upload_date last_modify_date mitre_version priority
|
||||
| collect `jarvis_index`
|
||||
```
|
||||
|
||||
[]
|
||||
```
|
||||
`indextime` `sysmon` (process_name="mshta.exe" OR command_line="*mshta*") AND (command_line="*http://*" OR command_line="*https://*")
|
||||
| eval hash_sha256=lower(hash_sha256),
|
||||
hunting_trigger="INFOSTEALER - Suspicious mshta execution with remote URL detected",
|
||||
mitre_category="Execution",
|
||||
mitre_technique="Mshta",
|
||||
mitre_technique_id="T1218.005",
|
||||
mitre_subtechnique="",
|
||||
mitre_subtechnique_id="",
|
||||
apt="",
|
||||
mitre_link="https://attack.mitre.org/techniques/T1218/005/",
|
||||
creator="Cpl Iverson",
|
||||
last_tested="",
|
||||
upload_date="2025-03-16",
|
||||
last_modify_date="2025-03-16",
|
||||
mitre_version="v16",
|
||||
priority="High"
|
||||
| `process_create_whitelist`
|
||||
| eval indextime = _indextime
|
||||
| convert ctime(indextime)
|
||||
| table _time indextime event_description hash_sha256 host_fqdn user_name original_file_name process_path process_guid process_parent_path process_id process_parent_id process_command_line process_parent_command_line process_parent_guid mitre_category mitre_technique mitre_technique_id hunting_trigger mitre_subtechnique mitre_subtechnique_id apt mitre_link last_tested creator upload_date last_modify_date mitre_version priority
|
||||
| collect `jarvis_index`
|
||||
```
|
||||
|
||||
[]
|
||||
```
|
||||
`indextime` `powershell` EventCode="4103"
|
||||
| where CommandLine LIKE "%Get-Process%" AND CommandLine LIKE "%mainWindowTitle%"
|
||||
| eval hash_sha256=lower(hash_sha256),
|
||||
hunting_trigger="INFOSTEALER - PowerShell enumeration using Get-Process and mainWindowTitle",
|
||||
mitre_category="Discovery",
|
||||
mitre_technique="System Information Discovery",
|
||||
mitre_technique_id="T1082",
|
||||
mitre_subtechnique="",
|
||||
mitre_subtechnique_id="",
|
||||
apt="",
|
||||
mitre_link="https://attack.mitre.org/techniques/T1082/",
|
||||
creator="Cpl Iverson",
|
||||
last_tested="",
|
||||
upload_date="2025-03-16",
|
||||
last_modify_date="2025-03-16",
|
||||
mitre_version="v16",
|
||||
priority="Medium"
|
||||
| eval indextime = _indextime
|
||||
| convert ctime(indextime)
|
||||
| table _time indextime event_description hash_sha256 host_fqdn user_name original_file_name process_path process_guid process_parent_path process_id process_parent_id process_command_line process_parent_command_line process_parent_guid mitre_category mitre_technique mitre_technique_id hunting_trigger mitre_subtechnique mitre_subtechnique_id apt mitre_link last_tested creator upload_date last_modify_date mitre_version priority
|
||||
| collect `jarvis_index`
|
||||
```
|
||||
|
||||
[T1010] Suspicious Process Enumeration via Get-Process and mainWindowTitle
|
||||
```
|
||||
`indextime` (`sysmon` EventCode=1) OR (`windows` EventCode=4688) OR (`powershell` EventCode=4103)
|
||||
| where CommandLine LIKE "%Get-Process%" AND CommandLine LIKE "%mainWindowTitle%"
|
||||
| eval hash_sha256=lower(hash_sha256),
|
||||
hunting_trigger="INFOSTEALER - T1010 - Analytic 1 - Suspicious Process Enumeration",
|
||||
mitre_category="Discovery",
|
||||
mitre_technique="Application Window Discovery",
|
||||
mitre_technique_id="T1010",
|
||||
mitre_subtechnique="",
|
||||
mitre_subtechnique_id="",
|
||||
apt="",
|
||||
mitre_link="https://attack.mitre.org/techniques/T1010/",
|
||||
creator="Cpl Iverson",
|
||||
last_tested="",
|
||||
upload_date="2025-03-16",
|
||||
last_modify_date="2025-03-16",
|
||||
mitre_version="v16",
|
||||
priority="Medium",
|
||||
custom_category="infostealer"
|
||||
| eval indextime = _indextime
|
||||
| convert ctime(indextime)
|
||||
| table _time indextime event_description hash_sha256 host_fqdn user_name original_file_name process_path process_guid process_parent_path process_id process_parent_id process_command_line process_parent_command_line process_parent_guid mitre_category mitre_technique mitre_technique_id hunting_trigger mitre_subtechnique mitre_subtechnique_id apt mitre_link last_tested creator upload_date last_modify_date mitre_version priority custom_category
|
||||
| collect `jarvis_index`
|
||||
```
|
||||
|
||||
(CHECK) T1012 - Analytic 1 - Suspicious Commands
|
||||
|
||||
```
|
||||
`indextime` ('powershell' EventCode="4103")
|
||||
| where CommandLine LIKE "%New-PSDrive%" AND (CommandLine LIKE "%Registry%" OR CommandLine LIKE "%HKEY_CLASSES_ROOT%" OR CommandLine LIKE "%HKCR%")
|
||||
| eval hash_sha256=lower(hash_sha256),
|
||||
hunting_trigger="INFOSTEALER - T1012 - Analytic 1 - Suspicious Commands",
|
||||
mitre_category="Discovery",
|
||||
mitre_technique="",
|
||||
mitre_technique_id="T1012",
|
||||
mitre_subtechnique="",
|
||||
mitre_subtechnique_id="",
|
||||
apt="",
|
||||
mitre_link="https://attack.mitre.org/techniques/T1012/",
|
||||
creator="Cpl Iverson",
|
||||
last_tested="",
|
||||
upload_date="2025-03-16",
|
||||
last_modify_date="2025-03-16",
|
||||
mitre_version="v16",
|
||||
priority="Medium"
|
||||
| eval indextime = _indextime
|
||||
| convert ctime(indextime)
|
||||
| table _time indextime event_description hash_sha256 host_fqdn user_name original_file_name process_path process_guid process_parent_path process_id process_parent_id process_command_line process_parent_command_line process_parent_guid mitre_category mitre_technique mitre_technique_id hunting_trigger mitre_subtechnique mitre_subtechnique_id apt mitre_link last_tested creator upload_date last_modify_date mitre_version priority
|
||||
| collect `jarvis_index`
|
||||
```
|
||||
|
||||
(CHECK) T1012 - Analytic 1 - Suspicious Processes with Registry keys
|
||||
```
|
||||
`indextime` (`sysmon` EventCode="1") OR (`windows-security` EventCode="4688")
|
||||
| search (CommandLine LIKE "%reg%" AND CommandLine LIKE "%query%") OR (CommandLine LIKE "%Registry%" AND (CommandLine LIKE "%HKEY_CLASSES_ROOT%" OR CommandLine "%HKCR%"))
|
||||
| eval hash_sha256=lower(hash_sha256),
|
||||
hunting_trigger="INFOSTEALER - T1012 - Analytic 1 - Suspicious Commands",
|
||||
mitre_category="Discovery",
|
||||
mitre_technique="",
|
||||
mitre_technique_id="T1012",
|
||||
mitre_subtechnique="",
|
||||
mitre_subtechnique_id="",
|
||||
apt="",
|
||||
mitre_link="https://attack.mitre.org/techniques/T1012/",
|
||||
creator="Cpl Iverson",
|
||||
last_tested="",
|
||||
upload_date="2025-03-16",
|
||||
last_modify_date="2025-03-16",
|
||||
mitre_version="v16",
|
||||
priority="Medium"
|
||||
| eval indextime = _indextime
|
||||
| convert ctime(indextime)
|
||||
| table _time indextime event_description hash_sha256 host_fqdn user_name original_file_name process_path process_guid process_parent_path process_id process_parent_id process_command_line process_parent_command_line process_parent_guid mitre_category mitre_technique mitre_technique_id hunting_trigger mitre_subtechnique mitre_subtechnique_id apt mitre_link last_tested creator upload_date last_modify_date mitre_version priority
|
||||
| collect `jarvis_index`
|
||||
```
|
||||
|
||||
(CHECK) T1012 - Analytic 2 - reg.exe spawned from suspicious cmd.exe
|
||||
```
|
||||
`indextime` ((`sysmon` EventCode="1") OR (`windows-security` EventCode="4688")
|
||||
| where (Image LIKE "%reg.exe%" AND ParentImage LIKE "%cmd.exe%")
|
||||
| rename ProcessParentGuid as guid
|
||||
| join type=inner guid[
|
||||
| search ((`sysmon` EventCode="1") OR (`windows-security` EventCode="4688") AND (Image LIKE "%cmd.exe%" AND ParentImage NOT LIKE "%explorer.exe%")
|
||||
| rename ProcessGuid as guid ]
|
||||
| eval hash_sha256=lower(hash_sha256),
|
||||
hunting_trigger="INFOSTEALER - T1012 - Analytic 2 - reg.exe spawned from suspicious cmd.exe",
|
||||
mitre_category="Discovery",
|
||||
mitre_technique="",
|
||||
mitre_technique_id="T1012",
|
||||
mitre_subtechnique="",
|
||||
mitre_subtechnique_id="",
|
||||
apt="",
|
||||
mitre_link="https://attack.mitre.org/techniques/T1012/",
|
||||
creator="Cpl Iverson",
|
||||
last_tested="",
|
||||
upload_date="2025-03-16",
|
||||
last_modify_date="2025-03-16",
|
||||
mitre_version="v16",
|
||||
priority="Medium"
|
||||
| eval indextime = _indextime
|
||||
| convert ctime(indextime)
|
||||
| table _time indextime event_description hash_sha256 host_fqdn user_name original_file_name process_path process_guid process_parent_path process_id process_parent_id process_command_line process_parent_command_line process_parent_guid mitre_category mitre_technique mitre_technique_id hunting_trigger mitre_subtechnique mitre_subtechnique_id apt mitre_link last_tested creator upload_date last_modify_date mitre_version priority
|
||||
| collect `jarvis_index`
|
||||
```
|
||||
(CHECK) T1012 - Analytic 3 - Rare LolBAS command lines
|
||||
```
|
||||
`indextime` ((`sysmon` EventCode="1") OR (`windows-security` EventCode="4688") AND Image IN ('FilePathToLolbasProcess01.exe','FilePathToLolbasProcess02.exe') AND number_standard_deviations = 1.5
|
||||
| select Image, ProcessCount, AVG(ProcessCount) Over() - STDEV(ProcessCount) Over() * number_standard_deviations AS LowerBound
|
||||
| WHERE ProcessCount < LowerBound
|
||||
| eval hash_sha256=lower(hash_sha256),
|
||||
hunting_trigger="INFOSTEALER - T1012 - Analytic 1 - Suspicious Commands",
|
||||
mitre_category="Discovery",
|
||||
mitre_technique="",
|
||||
mitre_technique_id="T1012",
|
||||
mitre_subtechnique="",
|
||||
mitre_subtechnique_id="",
|
||||
apt="",
|
||||
mitre_link="https://attack.mitre.org/techniques/T1012/",
|
||||
creator="Cpl Iverson",
|
||||
last_tested="",
|
||||
upload_date="2025-03-16",
|
||||
last_modify_date="2025-03-16",
|
||||
mitre_version="v16",
|
||||
priority="Medium"
|
||||
| eval indextime = _indextime
|
||||
| convert ctime(indextime)
|
||||
| table _time indextime event_description hash_sha256 host_fqdn user_name original_file_name process_path process_guid process_parent_path process_id process_parent_id process_command_line process_parent_command_line process_parent_guid mitre_category mitre_technique mitre_technique_id hunting_trigger mitre_subtechnique mitre_subtechnique_id apt mitre_link last_tested creator upload_date last_modify_date mitre_version priority
|
||||
| collect `jarvis_index`
|
||||
```
|
||||
|
||||
(CHECK) T1012 - Analytic 1 - Suspicious Registry
|
||||
```
|
||||
`indextime` (`windows-security` EventCode IN (4663, 4656)) AND ObjectType="Key"
|
||||
| where ObjectName LIKE "%SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall%" AND (UserAccessList LIKE "%4435%" OR UserAccessList LIKE "%Enumerate sub-keys%" OR UserAccessList LIKE "%4432%" OR UserAccessList LIKE "%Query key value%") AND Image NOT IN ('FilePathToExpectedProcess01.exe','FilePathToExpectedProcess02.exe')
|
||||
| eval hash_sha256=lower(hash_sha256),
|
||||
hunting_trigger="INFOSTEALER - T1012 - Analytic 1 - Suspicious Registry",
|
||||
mitre_category="Discovery",
|
||||
mitre_technique="",
|
||||
mitre_technique_id="T1012",
|
||||
mitre_subtechnique="",
|
||||
mitre_subtechnique_id="",
|
||||
apt="",
|
||||
mitre_link="https://attack.mitre.org/techniques/T1012/",
|
||||
creator="Cpl Iverson",
|
||||
last_tested="",
|
||||
upload_date="2025-03-16",
|
||||
last_modify_date="2025-03-16",
|
||||
mitre_version="v16",
|
||||
priority="Medium"
|
||||
| eval indextime = _indextime
|
||||
| convert ctime(indextime)
|
||||
| table _time indextime event_description hash_sha256 host_fqdn user_name original_file_name process_path process_guid process_parent_path process_id process_parent_id process_command_line process_parent_command_line process_parent_guid mitre_category mitre_technique mitre_technique_id hunting_trigger mitre_subtechnique mitre_subtechnique_id apt mitre_link last_tested creator upload_date last_modify_date mitre_version priority
|
||||
| collect `jarvis_index`
|
||||
```
|
||||
|
||||
[T1570] Suspicious Named Pipe Creation (C2 / Browser Exfil)
|
||||
```
|
||||
`indextime` `sysmon` EventCode=17
|
||||
| where match(Pipe, ".*\\\\pipe\\\\(msse-|postex|srvsvc).*") OR Pipe="*Chrome*" OR Pipe="*Edge*" OR Pipe="*sqlite*"
|
||||
| eval hash_sha256=lower(hash_sha256),
|
||||
hunting_trigger="INFOSTEALER - T1570 - Suspicious Named Pipe Activity (C2 / Browser Exfil)",
|
||||
mitre_category="Lateral Movement",
|
||||
mitre_technique="Lateral Tool Transfer",
|
||||
mitre_technique_id="T1570",
|
||||
mitre_subtechnique="",
|
||||
mitre_subtechnique_id="",
|
||||
apt="",
|
||||
mitre_link="https://attack.mitre.org/techniques/T1570/",
|
||||
creator="Cpl Iverson",
|
||||
last_tested="",
|
||||
upload_date="2025-03-20",
|
||||
last_modify_date="2025-03-20",
|
||||
mitre_version="v16",
|
||||
priority="Medium",
|
||||
custom_category="infostealer"
|
||||
| eval indextime = _indextime
|
||||
| convert ctime(indextime)
|
||||
| table _time indextime event_description hash_sha256 host_fqdn user_name Pipe Image ProcessId ProcessGuid original_file_name process_path process_guid process_parent_path process_id process_parent_id process_command_line process_parent_command_line process_parent_guid mitre_category mitre_technique mitre_technique_id hunting_trigger mitre_subtechnique mitre_subtechnique_id apt mitre_link last_tested creator upload_date last_modify_date mitre_version priority custom_category
|
||||
| collect `jarvis_index`
|
||||
```
|
||||
|
||||
[I1012] Spike in Registry Access (Potential Pre-Reverse Shell Activity)
|
||||
```
|
||||
`indextime` `sysmon` EventCode=13
|
||||
| timechart span=1m count by Image
|
||||
| eventstats avg(count) as avg_count, stdev(count) as stddev_count
|
||||
| eval threshold=(avg_count + (2 * stddev_count))
|
||||
| where count > threshold
|
||||
| eval hash_sha256=lower(hash_sha256),
|
||||
hunting_trigger="INFOSTEALER - T1012 - Registry Spike (Anomaly)",
|
||||
mitre_category="Discovery",
|
||||
mitre_technique="Query Registry",
|
||||
mitre_technique_id="T1012",
|
||||
mitre_subtechnique="",
|
||||
mitre_subtechnique_id="",
|
||||
apt="",
|
||||
mitre_link="https://attack.mitre.org/techniques/T1012/",
|
||||
creator="Cpl Iverson",
|
||||
last_tested="",
|
||||
upload_date="2025-03-20",
|
||||
last_modify_date="2025-03-20",
|
||||
mitre_version="v16",
|
||||
priority="Medium",
|
||||
custom_category="infostealer"
|
||||
| eval indextime = _indextime
|
||||
| convert ctime(indextime)
|
||||
| table _time indextime count threshold Image mitre_category mitre_technique mitre_technique_id hunting_trigger mitre_subtechnique mitre_subtechnique_id apt mitre_link last_tested creator upload_date last_modify_date mitre_version priority custom_category
|
||||
| collect `jarvis_index`
|
||||
|
||||
```
|
||||
|
||||
[I1012] High Volume Registry Access (TargetObject Enumeration)
|
||||
```
|
||||
`indextime` `sysmon` EventCode=13
|
||||
| stats count by _time, TargetObject
|
||||
| where count > 5
|
||||
| eval hash_sha256=lower(hash_sha256),
|
||||
hunting_trigger="INFOSTEALER - T1012 - High Volume Registry Enumeration",
|
||||
mitre_category="Discovery",
|
||||
mitre_technique="Query Registry",
|
||||
mitre_technique_id="T1012",
|
||||
mitre_subtechnique="",
|
||||
mitre_subtechnique_id="",
|
||||
apt="",
|
||||
mitre_link="https://attack.mitre.org/techniques/T1012/",
|
||||
creator="Cpl Iverson",
|
||||
last_tested="",
|
||||
upload_date="2025-03-20",
|
||||
last_modify_date="2025-03-20",
|
||||
mitre_version="v16",
|
||||
priority="Medium",
|
||||
custom_category="infostealer"
|
||||
| eval indextime = _indextime
|
||||
| convert ctime(indextime)
|
||||
| table _time indextime event_description hash_sha256 host_fqdn user_name TargetObject count mitre_category mitre_technique mitre_technique_id hunting_trigger mitre_subtechnique mitre_subtechnique_id apt mitre_link last_tested creator upload_date last_modify_date mitre_version priority custom_category
|
||||
| collect `jarvis_index`
|
||||
```
|
||||
|
||||
[T1059] Python Script Execution Logging to “results” File (Suspicious Scripting Activity)
|
||||
```
|
||||
`indextime` `sysmon` EventCode=1
|
||||
| search Image="*python*.exe" CommandLine="*results*"
|
||||
| eval hash_sha256=lower(hash_sha256),
|
||||
hunting_trigger="INFOSTEALER - T1059 - Analytic 1 - Suspicious Script Execution",
|
||||
mitre_category="Execution",
|
||||
mitre_technique="Command and Scripting Interpreter",
|
||||
mitre_technique_id="T1059",
|
||||
mitre_subtechnique="",
|
||||
mitre_subtechnique_id="",
|
||||
apt="",
|
||||
mitre_link="https://attack.mitre.org/techniques/T1059/",
|
||||
creator="Cpl Iverson",
|
||||
last_tested="",
|
||||
upload_date="2025-03-16",
|
||||
last_modify_date="2025-03-16",
|
||||
mitre_version="v16",
|
||||
priority="Medium"
|
||||
| eval indextime = _indextime
|
||||
| convert ctime(indextime)
|
||||
| table _time indextime event_description hash_sha256 host_fqdn user_name original_file_name process_path process_guid process_parent_path process_id process_parent_id process_command_line process_parent_command_line process_parent_guid mitre_category mitre_technique mitre_technique_id hunting_trigger mitre_subtechnique mitre_subtechnique_id apt mitre_link last_tested creator upload_date last_modify_date mitre_version priority
|
||||
| collect `jarvis_index`
|
||||
```
|
||||
|
||||
[T1012] Registry Modification Spike Indicative of Enumeration or Pre-Execution Behavior
|
||||
```
|
||||
`indextime` `sysmon` EventCode=13
|
||||
| stats count by _time, TargetObject
|
||||
| where count > 5
|
||||
| eval hash_sha256=lower(hash_sha256),
|
||||
hunting_trigger="INFOSTEALER - T1012 - Analytic 1 - Suspicious Registry Queries",
|
||||
mitre_category="Discovery",
|
||||
mitre_technique="Query Registry",
|
||||
mitre_technique_id="T1012",
|
||||
mitre_subtechnique="",
|
||||
mitre_subtechnique_id="",
|
||||
apt="",
|
||||
mitre_link="https://attack.mitre.org/techniques/T1012/",
|
||||
creator="Cpl Iverson",
|
||||
last_tested="",
|
||||
upload_date="2025-03-16",
|
||||
last_modify_date="2025-03-16",
|
||||
mitre_version="v16",
|
||||
priority="Medium"
|
||||
| eval indextime = _indextime
|
||||
| convert ctime(indextime)
|
||||
| table _time indextime event_description hash_sha256 host_fqdn user_name original_file_name process_path process_guid process_parent_path process_id process_parent_id process_command_line process_parent_command_line process_parent_guid mitre_category mitre_technique mitre_technique_id hunting_trigger mitre_subtechnique mitre_subtechnique_id apt mitre_link last_tested creator upload_date last_modify_date mitre_version priority
|
||||
| collect `jarvis_index`
|
||||
```
|
||||
|
||||
|
||||
[T1555.003] Unauthorized Access to Browser Credential Stores (SQLite: Cookies, History, Web Data)
|
||||
```
|
||||
`indextime` `sysmon` EventCode=10
|
||||
| search TargetFilename="*Cookies" OR TargetFilename="*History" OR TargetFilename="*Web Data"
|
||||
| eval hash_sha256=lower(hash_sha256),
|
||||
hunting_trigger="INFOSTEALER - T1555.003 - Analytic 1 - Unauthorized Browser Data Access",
|
||||
mitre_category="Credential Access",
|
||||
mitre_technique="Credentials from Password Stores",
|
||||
mitre_technique_id="T1555",
|
||||
mitre_subtechnique="Web Browsers",
|
||||
mitre_subtechnique_id="T1555.003",
|
||||
apt="",
|
||||
mitre_link="https://attack.mitre.org/techniques/T1555/003/",
|
||||
creator="Cpl Iverson",
|
||||
last_tested="",
|
||||
upload_date="2025-03-20",
|
||||
last_modify_date="2025-03-20",
|
||||
mitre_version="v16",
|
||||
priority="High",
|
||||
custom_category="infostealer",
|
||||
| eval indextime = _indextime
|
||||
| convert ctime(indextime)
|
||||
| table _time indextime event_description hash_sha256 host_fqdn user_name original_file_name process_path process_guid process_parent_path process_id process_parent_id process_command_line process_parent_command_line process_parent_guid mitre_category mitre_technique mitre_technique_id hunting_trigger mitre_subtechnique mitre_subtechnique_id apt mitre_link last_tested creator upload_date last_modify_date mitre_version priority
|
||||
| collect `jarvis_index`
|
||||
```
|
||||
|
||||
[T1041] High-Volume HTTP/S Exfiltration Attempt via Suspicious Process
|
||||
```
|
||||
`indextime` `sysmon` EventCode=3
|
||||
| search DestinationPort=80 OR DestinationPort=443
|
||||
| stats count by DestinationIp Image
|
||||
| where count > 5
|
||||
| eval hash_sha256=lower(hash_sha256),
|
||||
hunting_trigger="INFOSTEALER - T1041 - Analytic 1 - Suspicious Data Exfiltration",
|
||||
mitre_category="Exfiltration",
|
||||
mitre_technique="Exfiltration Over C2 Channel",
|
||||
mitre_technique_id="T1041",
|
||||
mitre_subtechnique="",
|
||||
mitre_subtechnique_id="",
|
||||
apt="",
|
||||
mitre_link="https://attack.mitre.org/techniques/T1041/",
|
||||
creator="Cpl Iverson",
|
||||
last_tested="",
|
||||
upload_date="2025-03-20",
|
||||
last_modify_date="2025-03-20",
|
||||
mitre_version="v16",
|
||||
priority="High",
|
||||
custom_category="infostealer",
|
||||
| eval indextime = _indextime
|
||||
| convert ctime(indextime)
|
||||
| table _time indextime event_description hash_sha256 host_fqdn user_name original_file_name process_path process_guid process_parent_path process_id process_parent_id process_command_line process_parent_command_line process_parent_guid mitre_category mitre_technique mitre_technique_id hunting_trigger mitre_subtechnique mitre_subtechnique_id apt mitre_link last_tested creator upload_date last_modify_date mitre_version priority custom_category
|
||||
| collect `jarvis_index`
|
||||
```
|
||||
|
||||
|
||||
[T1059.006] Detect Execution of Python Infostealer
|
||||
```
|
||||
`indextime` `windows` EventCode=4688
|
||||
| search NewProcessName="*python.exe" CommandLine="*results*"
|
||||
| eval hash_sha256=lower(hash_sha256),
|
||||
hunting_trigger="INFOSTEALER - T1059.006 - Suspicious Python Execution",
|
||||
mitre_category="Execution",
|
||||
mitre_technique="Command and Scripting Interpreter",
|
||||
mitre_technique_id="T1059",
|
||||
mitre_subtechnique="Python",
|
||||
mitre_subtechnique_id="T1059.006",
|
||||
apt="",
|
||||
mitre_link="https://attack.mitre.org/techniques/T1059/006/",
|
||||
creator="Cpl Iverson",
|
||||
last_tested="",
|
||||
upload_date="2025-03-20",
|
||||
last_modify_date="2025-03-20",
|
||||
mitre_version="v16",
|
||||
priority="High",
|
||||
custom_category="infostealer"
|
||||
| eval indextime = _indextime
|
||||
| convert ctime(indextime)
|
||||
| table _time indextime event_description hash_sha256 host_fqdn user_name NewProcessName ProcessId ParentProcessName ParentProcessId CommandLine mitre_category mitre_technique mitre_technique_id hunting_trigger mitre_subtechnique mitre_subtechnique_id apt mitre_link last_tested creator upload_date last_modify_date mitre_version priority custom_category
|
||||
| collect `jarvis_index`
|
||||
```
|
||||
|
||||
[T1555.003] Detect Access to Browser Credential Storage
|
||||
```
|
||||
`indextime` `windows` EventCode=4663
|
||||
| search ObjectName="*Cookies" OR ObjectName="*Login Data" OR ObjectName="*Web Data" OR ObjectName="*History"
|
||||
| eval hash_sha256=lower(hash_sha256),
|
||||
hunting_trigger="INFOSTEALER - T1555.003 - Unauthorized Browser Credential Access",
|
||||
mitre_category="Credential Access",
|
||||
mitre_technique="Credentials from Password Stores",
|
||||
mitre_technique_id="T1555",
|
||||
mitre_subtechnique="Web Browsers",
|
||||
mitre_subtechnique_id="T1555.003",
|
||||
apt="",
|
||||
mitre_link="https://attack.mitre.org/techniques/T1555/003/",
|
||||
creator="Cpl Iverson",
|
||||
last_tested="",
|
||||
upload_date="2025-03-20",
|
||||
last_modify_date="2025-03-20",
|
||||
mitre_version="v16",
|
||||
priority="High",
|
||||
custom_category="infostealer"
|
||||
| eval indextime = _indextime
|
||||
| convert ctime(indextime)
|
||||
| table _time indextime event_description hash_sha256 host_fqdn user_name ObjectName ProcessName ProcessId Accesses mitre_category mitre_technique mitre_technique_id hunting_trigger mitre_subtechnique mitre_subtechnique_id apt mitre_link last_tested creator upload_date last_modify_date mitre_version priority custom_category
|
||||
| collect `jarvis_index`
|
||||
```
|
||||
|
||||
[T1012] Detect Registry Modification for Browser Decryption Key
|
||||
```
|
||||
indextime
|
||||
index=wineventlog EventCode=4657
|
||||
| search ObjectName="*os_crypt*"
|
||||
| eval hash_sha256=lower(hash_sha256),
|
||||
hunting_trigger="INFOSTEALER - T1012 - Suspicious Registry Query (Master Key Extraction)",
|
||||
mitre_category="Discovery",
|
||||
mitre_technique="Query Registry",
|
||||
mitre_technique_id="T1012",
|
||||
mitre_subtechnique="",
|
||||
mitre_subtechnique_id="",
|
||||
apt="",
|
||||
mitre_link="https://attack.mitre.org/techniques/T1012/",
|
||||
creator="Cpl Iverson",
|
||||
last_tested="",
|
||||
upload_date="2025-03-20",
|
||||
last_modify_date="2025-03-20",
|
||||
mitre_version="v16",
|
||||
priority="Medium",
|
||||
custom_category="infostealer"
|
||||
| eval indextime = _indextime
|
||||
| convert ctime(indextime)
|
||||
| table _time indextime event_description hash_sha256 host_fqdn user_name ObjectName ProcessName ProcessId mitre_category mitre_technique mitre_technique_id hunting_trigger mitre_subtechnique mitre_subtechnique_id apt mitre_link last_tested creator upload_date last_modify_date mitre_version priority custom_category
|
||||
| collect `jarvis_index`
|
||||
```
|
||||
|
||||
[T1036.003] Detection: File Renamed or Created as .py (Suspicious Python Script Drop)
|
||||
```
|
||||
`indextime` (`windows` EventCode=4663 ObjectName="*.py") OR (`sysmon` EventCode=11 TargetFilename="*.py")
|
||||
| eval hash_sha256=lower(hash_sha256),
|
||||
hunting_trigger="INFOSTEALER - T1036.003 - File Renamed or Created as Python Script",
|
||||
mitre_category="Defense Evasion",
|
||||
mitre_technique="Masquerading",
|
||||
mitre_technique_id="T1036",
|
||||
mitre_subtechnique="Rename System Utilities",
|
||||
mitre_subtechnique_id="T1036.003",
|
||||
apt="",
|
||||
mitre_link="https://attack.mitre.org/techniques/T1036/003/",
|
||||
creator="Cpl Iverson",
|
||||
last_tested="",
|
||||
upload_date="2025-03-20",
|
||||
last_modify_date="2025-03-20",
|
||||
mitre_version="v16",
|
||||
priority="Medium",
|
||||
custom_category="infostealer"
|
||||
| eval indextime = _indextime
|
||||
| convert ctime(indextime)
|
||||
| table _time indextime event_description hash_sha256 host_fqdn user_name ObjectName TargetFilename ProcessName Image ProcessId mitre_category mitre_technique mitre_technique_id hunting_trigger mitre_subtechnique mitre_subtechnique_id apt mitre_link last_tested creator upload_date last_modify_date mitre_version priority custom_category
|
||||
| collect `jarvis_index`
|
||||
```
|
||||
|
||||
[T1059] Python Script Execution (Suspicious Results File Usage)
|
||||
```
|
||||
`indextime` (`windows` EventCode=4688 NewProcessName="*python.exe" CommandLine="*results*") OR (`sysmon` EventCode=1 Image="*python.exe" CommandLine="*results*")
|
||||
| eval hash_sha256=lower(hash_sha256),
|
||||
hunting_trigger="INFOSTEALER - T1059.006 - Suspicious Python Script Execution",
|
||||
mitre_category="Execution",
|
||||
mitre_technique="Command and Scripting Interpreter",
|
||||
mitre_technique_id="T1059",
|
||||
mitre_subtechnique="Python",
|
||||
mitre_subtechnique_id="T1059.006",
|
||||
apt="",
|
||||
mitre_link="https://attack.mitre.org/techniques/T1059/006/",
|
||||
creator="Cpl Iverson",
|
||||
last_tested="",
|
||||
upload_date="2025-03-20",
|
||||
last_modify_date="2025-03-20",
|
||||
mitre_version="v16",
|
||||
priority="High",
|
||||
custom_category="infostealer"
|
||||
| eval indextime = _indextime
|
||||
| convert ctime(indextime)
|
||||
| table _time indextime event_description hash_sha256 host_fqdn user_name NewProcessName Image ProcessId CommandLine ParentProcessName ParentProcessId mitre_category mitre_technique mitre_technique_id hunting_trigger mitre_subtechnique mitre_subtechnique_id apt mitre_link last_tested creator upload_date last_modify_date mitre_version priority custom_category
|
||||
| collect `jarvis_index`
|
||||
```
|
||||
|
||||
[T1555] Browser Credential File Access
|
||||
```
|
||||
`indextime` (`windows` EventCode=4663 ObjectName="*Cookies" OR ObjectName="*Login Data" OR ObjectName="*Web Data" OR ObjectName="*History") OR (`sysmon` EventCode=10 TargetFilename="*Cookies" OR TargetFilename="*Login Data" OR TargetFilename="*Web Data" OR TargetFilename="*History")
|
||||
| eval hash_sha256=lower(hash_sha256),
|
||||
hunting_trigger="INFOSTEALER - T1555.003 - Browser Credential File Access",
|
||||
mitre_category="Credential Access",
|
||||
mitre_technique="Credentials from Password Stores",
|
||||
mitre_technique_id="T1555",
|
||||
mitre_subtechnique="Web Browsers",
|
||||
mitre_subtechnique_id="T1555.003",
|
||||
apt="",
|
||||
mitre_link="https://attack.mitre.org/techniques/T1555/003/",
|
||||
creator="Cpl Iverson",
|
||||
last_tested="",
|
||||
upload_date="2025-03-20",
|
||||
last_modify_date="2025-03-20",
|
||||
mitre_version="v16",
|
||||
priority="High",
|
||||
custom_category="infostealer"
|
||||
| eval indextime = _indextime
|
||||
| convert ctime(indextime)
|
||||
| table _time indextime event_description hash_sha256 host_fqdn user_name ObjectName TargetFilename ProcessName Image ProcessId Accesses mitre_category mitre_technique mitre_technique_id hunting_trigger mitre_subtechnique mitre_subtechnique_id apt mitre_link last_tested creator upload_date last_modify_date mitre_version priority custom_category
|
||||
| collect `jarvis_index`
|
||||
```
|
||||
|
||||
[T1012] Registry Key Access (Browser Master Key)
|
||||
```
|
||||
`indextime` (`windows` EventCode=4657 ObjectName="*os_crypt*") OR (`sysmon` EventCode=13 TargetObject="*os_crypt*")
|
||||
| eval hash_sha256=lower(hash_sha256),
|
||||
hunting_trigger="INFOSTEALER - T1012 - Suspicious Registry Key Query",
|
||||
mitre_category="Discovery",
|
||||
mitre_technique="Query Registry",
|
||||
mitre_technique_id="T1012",
|
||||
mitre_subtechnique="",
|
||||
mitre_subtechnique_id="",
|
||||
apt="",
|
||||
mitre_link="https://attack.mitre.org/techniques/T1012/",
|
||||
creator="Cpl Iverson",
|
||||
last_tested="",
|
||||
upload_date="2025-03-20",
|
||||
last_modify_date="2025-03-20",
|
||||
mitre_version="v16",
|
||||
priority="Medium",
|
||||
custom_category="infostealer"
|
||||
| eval indextime = _indextime
|
||||
| convert ctime(indextime)
|
||||
| table _time indextime event_description hash_sha256 host_fqdn user_name ObjectName TargetObject ProcessName Image ProcessId mitre_category mitre_technique mitre_technique_id hunting_trigger mitre_subtechnique mitre_subtechnique_id apt mitre_link last_tested creator upload_date last_modify_date mitre_version priority custom_category
|
||||
| collect `jarvis_index`
|
||||
```
|
||||
|
||||
[T1041] Exfiltration over Network (HTTP/HTTPS burst)
|
||||
```
|
||||
`indextime` (`windows` EventCode=5156 DestinationPort=80 OR DestinationPort=443) OR (`sysmon` EventCode=3 DestinationPort=80 OR DestinationPort=443)
|
||||
| stats count by DestinationIp ApplicationName Image
|
||||
| where count > 5
|
||||
| eval hash_sha256=lower(hash_sha256),
|
||||
hunting_trigger="INFOSTEALER - T1041 - High-Volume C2 Exfiltration",
|
||||
mitre_category="Exfiltration",
|
||||
mitre_technique="Exfiltration Over C2 Channel",
|
||||
mitre_technique_id="T1041",
|
||||
mitre_subtechnique="",
|
||||
mitre_subtechnique_id="",
|
||||
apt="",
|
||||
mitre_link="https://attack.mitre.org/techniques/T1041/",
|
||||
creator="Cpl Iverson",
|
||||
last_tested="",
|
||||
upload_date="2025-03-20",
|
||||
last_modify_date="2025-03-20",
|
||||
mitre_version="v16",
|
||||
priority="High",
|
||||
custom_category="infostealer"
|
||||
| eval indextime = _indextime
|
||||
| convert ctime(indextime)
|
||||
| table _time indextime event_description hash_sha256 host_fqdn user_name ApplicationName Image DestinationIp DestinationPort mitre_category mitre_technique mitre_technique_id hunting_trigger mitre_subtechnique mitre_subtechnique_id apt mitre_link last_tested creator upload_date last_modify_date mitre_version priority custom_category
|
||||
| collect `jarvis_index`
|
||||
```
|
||||
|
||||
|
||||
## References
|
||||
[1]: https://www.group-ib.com/blog/clickfix-the-social-engineering-technique-hackers-use-to-manipulate-victims
|
||||
[2]: https://0xmrmagnezi.github.io/malware%20analysis/LummaStealer/
|
4
steps.md
Normal file
4
steps.md
Normal file
@ -0,0 +1,4 @@
|
||||
index=infostealer
|
||||
1000 - 1030 20250319
|
||||
nmap > email > phishing link > rdp > file upload > run py script (data staging) > exfil > remove files
|
||||
|
39
yara.md
Normal file
39
yara.md
Normal file
@ -0,0 +1,39 @@
|
||||
rule M_AES_Encrypted_payload {
|
||||
meta:
|
||||
author = "Mandiant"
|
||||
description = "This rule is desgined to detect on events that
|
||||
exhibits indicators of utilizing AES encryption for payload obfuscation."
|
||||
target_entity = "Process"
|
||||
strings:
|
||||
$a = /(\$\w+\.Key(\s|)=((\s|)(\w+|));|\$\w+\.Key(\s|)=(\s|)\w+\('\w+'\);)/
|
||||
$b = /\$\w+\.IV/
|
||||
$c = /System\.Security\.Cryptography\.(AesManaged|Aes)/
|
||||
condition:
|
||||
all of them
|
||||
}
|
||||
|
||||
rule M_Downloader_PEAKLIGHT_1 {
|
||||
meta:
|
||||
mandiant_rule_id = "e0abae27-0816-446f-9475-1987ccbb1bc0"
|
||||
author = "Mandiant"
|
||||
category = "Malware"
|
||||
description = "This rule is designed to detect on events related to peaklight.
|
||||
PEAKLIGHT is an obfuscated PowerShell-based downloader which checks for
|
||||
the presence of hard-coded filenames and downloads files from a remote CDN
|
||||
if the files are not present."
|
||||
family = "Peaklight"
|
||||
platform = "Windows"
|
||||
strings:
|
||||
$str1 = /function\s{1,16}\w{1,32}\(\$\w{1,32},\s{1,4}\$\w{1,32}\)\
|
||||
{\[IO\.File\]::WriteAllBytes\(\$\w{1,32},\s{1,4}\$\w{1,32}\)\}/ ascii wide
|
||||
$str2 = /Expand-Archive\s{1,16}-Path\s{1,16}\$\w{1,32}\
|
||||
s{1,16}-DestinationPath/ ascii wide
|
||||
$str3 = /\(\w{1,32}\s{1,4}@\((\d{3,6},){3,12}/ ascii wide
|
||||
$str4 = ".DownloadData(" ascii wide
|
||||
$str5 = "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12" ascii wide
|
||||
$str6 = /\.EndsWith\(((["']\.zip["'])|(\(\w{1,32}\s{1,16}@\((\d{3,6},){3}\d{3,6}\)\)))/ ascii wide
|
||||
$str7 = "Add -Type -Assembly System.IO.Compression.FileSystem" ascii wide
|
||||
$str8 = "[IO.Compression.ZipFile]::OpenRead"
|
||||
condition:
|
||||
4 of them and filesize < 10KB
|
||||
}
|
Reference in New Issue
Block a user