PUA - 3Proxy Execution

Detects the use of 3proxy, a tiny free proxy server

Sigma rule (View on GitHub)

 1title: PUA - 3Proxy Execution
 2id: f38a82d2-fba3-4781-b549-525efbec8506
 3status: test
 4description: Detects the use of 3proxy, a tiny free proxy server
 5references:
 6    - https://github.com/3proxy/3proxy
 7    - https://blog.talosintelligence.com/2022/09/lazarus-three-rats.html
 8author: Florian Roth (Nextron Systems)
 9date: 2022-09-13
10modified: 2023-02-21
11tags:
12    - attack.command-and-control
13    - attack.t1572
14logsource:
15    category: process_creation
16    product: windows
17detection:
18    selection_img:
19        Image|endswith: '\3proxy.exe'
20    selection_pe:
21        Description: '3proxy - tiny proxy server'
22    selection_params: # param combos seen in the wild
23        CommandLine|contains: '.exe -i127.0.0.1 -p'
24    condition: 1 of selection_*
25falsepositives:
26    - Administrative activity
27level: high

References

Related rules

to-top