Feature/rm submodule (#312)
* rm: submodule * Add: rules * Fix: hayabusa-rules to c9c10a
This commit is contained in:
@@ -0,0 +1,43 @@
|
||||
|
||||
title: Rubeus Hack Tool
|
||||
ruletype: Sigma
|
||||
author: Florian Roth
|
||||
date: 2018/12/19
|
||||
description: Detects command line parameters used by Rubeus hack tool
|
||||
detection:
|
||||
SELECTION_1:
|
||||
EventID: 1
|
||||
SELECTION_2:
|
||||
CommandLine:
|
||||
- '* asreproast *'
|
||||
- '* dump /service:krbtgt *'
|
||||
- '* kerberoast *'
|
||||
- '* createnetonly /program:*'
|
||||
- '* ptt /ticket:*'
|
||||
- '* /impersonateuser:*'
|
||||
- '* renew /ticket:*'
|
||||
- '* asktgt /user:*'
|
||||
- '* harvest /interval:*'
|
||||
- '* s4u /user:*'
|
||||
- '* s4u /ticket:*'
|
||||
- '* hash /password:*'
|
||||
condition: (SELECTION_1 and SELECTION_2)
|
||||
falsepositives:
|
||||
- unlikely
|
||||
id: 7ec2c172-dceb-4c10-92c9-87c1881b7e18
|
||||
level: critical
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
modified: 2021/11/27
|
||||
references:
|
||||
- https://www.harmj0y.net/blog/redteaming/from-kekeo-to-rubeus/
|
||||
status: test
|
||||
tags:
|
||||
- attack.credential_access
|
||||
- attack.t1003
|
||||
- attack.t1558.003
|
||||
- attack.t1558
|
||||
- attack.lateral_movement
|
||||
- attack.t1550.003
|
||||
- attack.t1097
|
||||
Reference in New Issue
Block a user