Potential NetWire RAT Activity - Registry
Detects registry keys related to NetWire RAT
Sigma rule (View on GitHub)
1title: Potential NetWire RAT Activity - Registry
2id: 1d218616-71b0-4c40-855b-9dbe75510f7f
3status: test
4description: Detects registry keys related to NetWire RAT
5references:
6 - https://www.fortinet.com/blog/threat-research/new-netwire-rat-variant-spread-by-phishing
7 - https://resources.infosecinstitute.com/topic/netwire-malware-what-it-is-how-it-works-and-how-to-prevent-it-malware-spotlight/
8 - https://unit42.paloaltonetworks.com/guloader-installing-netwire-rat/
9 - https://blogs.blackberry.com/en/2021/09/threat-thursday-netwire-rat-is-coming-down-the-line
10 - https://app.any.run/tasks/41ecdbde-4997-4301-a350-0270448b4c8f/
11author: Christopher Peacock
12date: 2021-10-07
13modified: 2023-02-07
14tags:
15 - attack.defense-evasion
16 - attack.t1112
17logsource:
18 product: windows
19 category: registry_add
20detection:
21 selection:
22 EventType: CreateKey
23 # The configuration information is usually stored under HKCU:\Software\Netwire - RedCanary
24 TargetObject|contains: '\software\NetWire'
25 condition: selection
26falsepositives:
27 - Unknown
28level: high
References
Related rules
- Activate Suppression of Windows Security Center Notifications
- Add DisallowRun Execution to Registry
- Allow RDP Remote Assistance Feature
- Blackbyte Ransomware Registry
- CVE-2020-1048 Exploitation Attempt - Suspicious New Printer Ports - Registry