Skip to content

Commit 25f6824

Browse files
authored
Merge pull request #959 from nterl0k/nterl0k-t1486-bitlocker-sus-commands
Nterl0k - T1486 BitLocker Suspicious Commands
2 parents 4eea3c5 + 5c06969 commit 25f6824

File tree

2 files changed

+17
-0
lines changed

2 files changed

+17
-0
lines changed
Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
version https://git-lfs.github.com/spec/v1
2+
oid sha256:9e1e4b875d2ae27e4b2c99e6403cf2f642d087f415af2a06c0b63e0556110002
3+
size 2002
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
author: Steven Dick
2+
id: 2cf75567-0739-4cd2-8d83-fd5c0177045e
3+
date: '2025-02-10'
4+
description: 'A sample event with a known abusedd manage-bde command.'
5+
environment: attack_range
6+
dataset:
7+
- https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1486/bitlocker_sus_commands/bitlocker_sus_commands.log
8+
sourcetypes:
9+
- XmlWinEventLog
10+
references:
11+
- https://attack.mitre.org/techniques/T1486/
12+
- https://www.nccgroup.com/us/research-blog/nameless-and-shameless-ransomware-encryption-via-bitlocker/
13+
- https://www.bitdefender.com/en-us/blog/businessinsights/shrinklocker-decryptor-from-friend-to-foe-and-back-again
14+
- https://www.bleepingcomputer.com/news/security/new-shrinklocker-ransomware-uses-bitlocker-to-encrypt-your-files/

0 commit comments

Comments
 (0)