Potential Dtrack RAT Activity
Detects potential Dtrack RAT activity via specific process patterns
Sigma rule (View on GitHub)
1title: Potential Dtrack RAT Activity
2id: f1531fa4-5b84-4342-8f68-9cf3fdbd83d4
3status: stable
4description: Detects potential Dtrack RAT activity via specific process patterns
5references:
6 - https://securelist.com/my-name-is-dtrack/93338/
7 - https://securelist.com/andariel-deploys-dtrack-and-maui-ransomware/107063/
8 - https://www.cyberbit.com/endpoint-security/dtrack-apt-malware-found-in-nuclear-power-plant/
9 - https://app.any.run/tasks/4bc9860d-ab51-4077-9e09-59ad346b92fd/
10 - https://app.any.run/tasks/ce4deab5-3263-494f-93e3-afb2b9d79f14/
11author: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
12date: 2019-10-30
13modified: 2023-02-03
14tags:
15 - attack.impact
16 - attack.t1490
17 - detection.emerging-threats
18logsource:
19 category: process_creation
20 product: windows
21detection:
22 selection_ping:
23 CommandLine|contains|all:
24 - 'ping -n '
25 - ' echo EEEE > '
26 selection_ipconfig:
27 CommandLine|contains|all:
28 - 'ipconfig /all'
29 - '\temp\res.ip'
30 selection_netsh:
31 CommandLine|contains|all:
32 - 'interface ip show config'
33 - '\temp\netsh.res'
34 condition: 1 of selection_*
35fields:
36 - CommandLine
37 - ParentCommandLine
38falsepositives:
39 - Unlikely
40level: critical
References
Related rules
- Potential Maze Ransomware Activity
- WannaCry Ransomware Activity
- All Backups Deleted Via Wbadmin.EXE
- Backup Files Deleted
- BlueSky Ransomware Artefacts