ZxShell Malware
Detects a ZxShell start by the called and well-known function name
Sigma rule (View on GitHub)
1title: ZxShell Malware
2id: f0b70adb-0075-43b0-9745-e82a1c608fcc
3status: test
4description: Detects a ZxShell start by the called and well-known function name
5references:
6 - https://www.hybrid-analysis.com/sample/5d2a4cde9fa7c2fdbf39b2e2ffd23378d0c50701a3095d1e91e3cf922d7b0b16?environmentId=100
7 - https://pub-7cb8ac806c1b4c4383e585c474a24719.r2.dev/116309e7121bc8b0e66e4166c06f7b818e1d3629.pdf
8author: Florian Roth (Nextron Systems), oscd.community, Jonhnathan Ribeiro
9date: 2017-07-20
10modified: 2021-11-27
11tags:
12 - attack.execution
13 - attack.t1059.003
14 - attack.defense-evasion
15 - attack.t1218.011
16 - attack.s0412
17 - attack.g0001
18 - detection.emerging-threats
19logsource:
20 category: process_creation
21 product: windows
22detection:
23 selection:
24 Image|endswith: '\rundll32.exe'
25 CommandLine|contains:
26 - 'zxFunction'
27 - 'RemoteDiskXXXXX'
28 condition: selection
29fields:
30 - CommandLine
31 - ParentCommandLine
32falsepositives:
33 - Unlikely
34level: critical
References
Related rules
- Sofacy Trojan Loader Activity
- APT29 2018 Phishing Campaign CommandLine Indicators
- Fireball Archer Install
- HTML Help HH.EXE Suspicious Child Process
- HackTool - RedMimicry Winnti Playbook Execution