Suspicious BlackCat-Related Exfiltration Command

Detects process execution of RClone or similar tools used by ransomware operators to exfiltrate data.

Sigma rule (View on GitHub)

 1title: Suspicious BlackCat-Related Exfiltration Command
 2id: 613624be-dabf-4562-b49b-c2fd45773556
 3status: experimental
 4description: Detects process execution of RClone or similar tools used by ransomware operators to exfiltrate data.
 5references:
 6    - https://www.microsoft.com/en-us/security/blog/2022/06/13/the-many-lives-of-blackcat-ransomware/
 7    - https://rclone.org/docs/
 8author: Micah Babinski
 9date: 2022/12/04
10tags:
11    - attack.exfiltration
12    - attack.t1020
13    - attack.t1537
14logsource:
15    category: process_creation
16    product: windows
17detection:
18    selection:
19        CommandLine|contains|all:
20            - 'copy'
21            - '--max-age'
22            - '--ignore-existing'
23            - '--multi-thread-streams'
24            - '--transfers'
25        CommandLine|contains:
26            - 'ftp'
27            - 'ssh'
28            - '-q'
29    condition: selection
30falsepositives:
31    - Legitimate use of rclone to manage files on cloud storage.
32level: high```

References

Related rules

to-top