Skip to content

Commit 87f9a1a

Browse files
authored
Merge pull request #3240 from splunk/crypto_campaign
crypto_campaign
2 parents aeaba02 + 6692321 commit 87f9a1a

File tree

43 files changed

+643
-148
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

43 files changed

+643
-148
lines changed

detections/endpoint/add_or_set_windows_defender_exclusion.yml

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Add or Set Windows Defender Exclusion
22
id: 773b66fe-4dd9-11ec-8289-acde48001122
3-
version: 6
4-
date: '2024-12-10'
3+
version: '6'
4+
date: '2024-12-17'
55
author: Teoderick Contreras, Splunk
66
status: production
77
type: TTP
@@ -65,14 +65,15 @@ rba:
6565
threat_objects: []
6666
tags:
6767
analytic_story:
68-
- WhisperGate
69-
- Windows Defense Evasion Tactics
68+
- CISA AA22-320A
69+
- AgentTesla
7070
- Remcos
7171
- Data Destruction
72-
- CISA AA22-320A
73-
- ValleyRAT
7472
- Compromised Windows Host
75-
- AgentTesla
73+
- ValleyRAT
74+
- Windows Defense Evasion Tactics
75+
- WhisperGate
76+
- Crypto Stealer
7677
asset_type: Endpoint
7778
mitre_attack_id:
7879
- T1562.001

detections/endpoint/any_powershell_downloadfile.yml

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -71,15 +71,16 @@ rba:
7171
type: process_name
7272
tags:
7373
analytic_story:
74-
- DarkCrystal RAT
75-
- Ingress Tool Transfer
7674
- Hermetic Wiper
77-
- Malicious PowerShell
78-
- Data Destruction
7975
- Log4Shell CVE-2021-44228
8076
- Phemedrone Stealer
81-
- Braodo Stealer
77+
- Data Destruction
8278
- PXA Stealer
79+
- Ingress Tool Transfer
80+
- Malicious PowerShell
81+
- DarkCrystal RAT
82+
- Crypto Stealer
83+
- Braodo Stealer
8384
asset_type: Endpoint
8485
cve:
8586
- CVE-2021-44228

detections/endpoint/chcp_command_execution.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,9 +65,10 @@ rba:
6565
threat_objects: []
6666
tags:
6767
analytic_story:
68-
- IcedID
6968
- Azorult
7069
- Forest Blizzard
70+
- Crypto Stealer
71+
- IcedID
7172
asset_type: Endpoint
7273
mitre_attack_id:
7374
- T1059

detections/endpoint/cmd_carry_out_string_command_parameter.yml

Lines changed: 15 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -38,26 +38,27 @@ references:
3838
- https://www.microsoft.com/security/blog/2022/01/15/destructive-malware-targeting-ukrainian-organizations/
3939
tags:
4040
analytic_story:
41-
- AsyncRAT
42-
- Winter Vivern
43-
- WhisperGate
44-
- Living Off The Land
41+
- Data Destruction
4542
- DarkGate Malware
43+
- Chaos Ransomware
44+
- Hermetic Wiper
45+
- Warzone RAT
46+
- Winter Vivern
4647
- ProxyNotShell
47-
- Log4Shell CVE-2021-44228
48+
- IcedID
49+
- Living Off The Land
4850
- NjRAT
49-
- RedLine Stealer
51+
- Log4Shell CVE-2021-44228
52+
- CISA AA23-347A
53+
- AsyncRAT
5054
- Rhysida Ransomware
51-
- IcedID
52-
- Chaos Ransomware
53-
- PlugX
55+
- DarkCrystal RAT
56+
- Crypto Stealer
5457
- Azorult
5558
- Qakbot
56-
- Hermetic Wiper
57-
- Warzone RAT
58-
- DarkCrystal RAT
59-
- CISA AA23-347A
60-
- Data Destruction
59+
- RedLine Stealer
60+
- PlugX
61+
- WhisperGate
6162
asset_type: Endpoint
6263
cve:
6364
- CVE-2021-44228

detections/endpoint/detect_password_spray_attack_behavior_on_user.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -65,6 +65,7 @@ rba:
6565
tags:
6666
analytic_story:
6767
- Compromised User Account
68+
- Crypto Stealer
6869
asset_type: Account
6970
mitre_attack_id:
7071
- T1110.003

detections/endpoint/detect_rare_executables.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -60,6 +60,7 @@ tags:
6060
analytic_story:
6161
- Unusual Processes
6262
- Rhysida Ransomware
63+
- Crypto Stealer
6364
asset_type: Endpoint
6465
mitre_attack_id:
6566
- T1204

detections/endpoint/download_files_using_telegram.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,9 +50,10 @@ rba:
5050
threat_objects: []
5151
tags:
5252
analytic_story:
53-
- XMRig
5453
- Phemedrone Stealer
54+
- Crypto Stealer
5555
- Snake Keylogger
56+
- XMRig
5657
asset_type: Endpoint
5758
mitre_attack_id:
5859
- T1105

detections/endpoint/excessive_service_stop_attempt.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,9 +63,10 @@ rba:
6363
type: process_name
6464
tags:
6565
analytic_story:
66-
- XMRig
6766
- Ransomware
6867
- BlackByte Ransomware
68+
- Crypto Stealer
69+
- XMRig
6970
asset_type: Endpoint
7071
mitre_attack_id:
7172
- T1489

detections/endpoint/excessive_usage_of_cacls_app.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,10 +62,11 @@ rba:
6262
type: process_name
6363
tags:
6464
analytic_story:
65-
- XMRig
6665
- Azorult
6766
- Windows Post-Exploitation
6867
- Prestige Ransomware
68+
- XMRig
69+
- Crypto Stealer
6970
- Defense Evasion or Unauthorized Access Via SDDL Tampering
7071
asset_type: Endpoint
7172
mitre_attack_id:

detections/endpoint/excessive_usage_of_sc_service_utility.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,8 +54,9 @@ rba:
5454
threat_objects: []
5555
tags:
5656
analytic_story:
57-
- Ransomware
5857
- Azorult
58+
- Ransomware
59+
- Crypto Stealer
5960
asset_type: Endpoint
6061
mitre_attack_id:
6162
- T1569

0 commit comments

Comments
 (0)