Potential Ursnif Malware Activity - Registry
Detects registry keys related to Ursnif malware.
Sigma rule (View on GitHub)
1title: Potential Ursnif Malware Activity - Registry
2id: 21f17060-b282-4249-ade0-589ea3591558
3status: test
4description: Detects registry keys related to Ursnif malware.
5references:
6 - https://blog.yoroi.company/research/ursnif-long-live-the-steganography/
7 - https://blog.trendmicro.com/trendlabs-security-intelligence/phishing-campaign-uses-hijacked-emails-to-deliver-ursnif-by-replying-to-ongoing-threads/
8author: megan201296
9date: 2019-02-13
10modified: 2025-10-22
11tags:
12 - attack.persistence
13 - attack.defense-evasion
14 - attack.execution
15 - attack.t1112
16 - detection.emerging-threats
17logsource:
18 product: windows
19 category: registry_add
20detection:
21 selection:
22 TargetObject|endswith: '\Software\AppDataLow\Software\Microsoft\3A861D62-51E0-7C9D-AB0E-15700F2219A4'
23 condition: selection
24falsepositives:
25 - Unknown
26level: high
References
Related rules
- Blue Mockingbird - Registry
- Blue Mockingbird
- OilRig APT Activity
- OilRig APT Registry Persistence
- OilRig APT Schedule Task Persistence - Security