title: Antivirus Password Dumper Detection author: Florian Roth date: 2018/09/09 description: Detects a highly relevant Antivirus alert that reports a password dumper detection: SELECTION_1: Signature: '*DumpCreds*' SELECTION_10: Signature: '*Kekeo*' SELECTION_11: Signature: '*LsassDump*' SELECTION_12: Signature: '*Outflank*' SELECTION_2: Signature: '*Mimikatz*' SELECTION_3: Signature: '*PWCrack*' SELECTION_4: Signature: '*HTool/WCE*' SELECTION_5: Signature: '*PSWtool*' SELECTION_6: Signature: '*PWDump*' SELECTION_7: Signature: '*SecurityTool*' SELECTION_8: Signature: '*PShlSpy*' SELECTION_9: Signature: '*Rubeus*' condition: (SELECTION_1 or SELECTION_2 or SELECTION_3 or SELECTION_4 or SELECTION_5 or SELECTION_6 or SELECTION_7 or SELECTION_8 or SELECTION_9 or SELECTION_10 or SELECTION_11 or SELECTION_12) falsepositives: - Unlikely fields: - FileName - User id: 78cc2dd2-7d20-4d32-93ff-057084c38b93 level: critical logsource: product: antivirus modified: 2019/10/04 references: - https://www.nextron-systems.com/2018/09/08/antivirus-event-analysis-cheat-sheet-v1-4/ - https://www.virustotal.com/gui/file/5fcda49ee7f202559a6cbbb34edb65c33c9a1e0bde9fa2af06a6f11b55ded619/detection tags: - attack.credential_access - attack.t1003 - attack.t1558 - attack.t1003.001 - attack.t1003.002 yml_filename: av_password_dumper.yml yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/malware