Potential COLDSTEEL Persistence Service DLL Creation

Detects the creation of a file in a specific location and with a specific name related to COLDSTEEL RAT

Sigma rule (View on GitHub)

 1title: Potential COLDSTEEL Persistence Service DLL Creation
 2id: 1fea93a2-1524-4a3c-9828-3aa0c2414e27
 3status: test
 4description: Detects the creation of a file in a specific location and with a specific name related to COLDSTEEL RAT
 5references:
 6    - https://www.ncsc.gov.uk/static-assets/documents/malware-analysis-reports/cold-steel/NCSC-MAR-Cold-Steel.pdf
 7author: X__Junior (Nextron Systems)
 8date: 2023/04/30
 9tags:
10    - attack.persistence
11    - attack.defense_evasion
12    - detection.emerging_threats
13logsource:
14    category: file_event
15    product: windows
16detection:
17    selection:
18        TargetFilename|startswith: 'C:\Users\'
19        TargetFilename|endswith: '\AppData\Roaming\newdev.dll'
20    condition: selection
21falsepositives:
22    - Unknown
23level: high

References

Related rules

to-top