Remcos

detect log.dat of remcos and registry entry

Sigma rule (View on GitHub)

 1title: Remcos
 2status: experimental
 3description: detect log.dat of remcos and registry entry
 4author: Joe Security
 5date: 2019-10-29
 6id: 200014
 7threatname: Remcos
 8behaviorgroup: 20
 9classification: 4
10logsource:
11    service: sysmon
12    product: windows
13detection:
14    selection:
15        EventID: 11
16        TargetFilename:
17            - '*\AppData\Roaming\remcos\logs*.dat*'
18            - '*\ProgramData\remcos\logs.dat*'
19    selection1:
20        EventID: 13
21        TargetObject:
22            - '*\Software\Remcos*exepath*'
23            - '*\Software\Rmc-*exepath*'
24            - '*\microsoft\windows\currentversion\run*remcos*'
25    condition: selection or selection1
26level: critical
to-top