Rclone SMB Share Exfiltration
Detection of a exfiltration activity using rclone from Windows network shares using SMB.
Sigma rule (View on GitHub)
1title: Rclone SMB Share Exfiltration
2id: 889bc648-5164-44f4-9388-fb5d6b58a7b2
3status: experimental
4description: Detection of a exfiltration activity using rclone from Windows network shares using SMB.
5author: TheDFIRReport
6date: 2022-09-12
7modified: 2023-01-08
8references:
9 - https://thedfirreport.com/
10logsource:
11 product: zeek
12 service: smb_files
13detection:
14 selection:
15 file_name|endswith:
16 - '\rclone.exe'
17 condition: selection
18falsepositives:
19 - Approved business backup processes.
20level: medium
21tags:
22 - attack.exfiltration
23 - attack.t1567.002
References
Related rules
- DNS Query for Ufile.io Upload Domain
- Suspicious BlackCat-Related Exfiltration Command
- AWS EC2 Download Userdata
- High DNS Bytes Out
- High DNS Bytes Out - Firewall