Potential COLDSTEEL RAT File Indicators
Detects the creation of a file named "dllhost.exe" in the "C:\users\public\Documents" directory. Seen being used by the COLDSTEEL RAT in some of its variants.
Sigma rule (View on GitHub)
1title: Potential COLDSTEEL RAT File Indicators
2id: c708a93f-46b4-4674-a5b8-54aa6219c5fa
3status: test
4description: Detects the creation of a file named "dllhost.exe" in the "C:\users\public\Documents\" directory. Seen being used by the COLDSTEEL RAT in some of its variants.
5references:
6 - https://www.ncsc.gov.uk/static-assets/documents/malware-analysis-reports/cold-steel/NCSC-MAR-Cold-Steel.pdf
7author: Nasreddine Bencherchali (Nextron Systems)
8date: 2023-04-30
9tags:
10 - attack.persistence
11 - attack.defense-evasion
12 - detection.emerging-threats
13logsource:
14 category: file_event
15 product: windows
16detection:
17 selection:
18 TargetFilename: 'C:\users\public\Documents\dllhost.exe'
19 condition: selection
20falsepositives:
21 - Unknown
22level: high
References
Related rules
- COLDSTEEL Persistence Service Creation
- COLDSTEEL RAT Anonymous User Process Execution
- COLDSTEEL RAT Cleanup Command Execution
- COLDSTEEL RAT Service Persistence Execution
- OilRig APT Activity