Rule Library

Sigma Rules

1,701 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

History File Deletion

Detects events in which a history file gets deleted, e.g. the ~/bash_history to remove traces of malicious activity

LinuxProcess Creation
TA0040 · ImpactT1565.001 · Stored Data Manipulation
Florian Roth (Nextron Systems)Mon Jun 20linux
Detectionhightest

Linux HackTool Execution

Detects known hacktool execution based on image name.

LinuxProcess Creation
TA0002 · ExecutionTA0042 · Resource DevelopmentT1587 · Develop Capabilities
Nasreddine Bencherchali (Nextron Systems)+1Tue Jan 03linux
Detectionhightest

Suspicious Java Children Processes

Detects java process spawning suspicious children

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)Fri Jun 03linux
Detectionhightest

Linux Recon Indicators

Detects events with patterns found in commands used for reconnaissance on linux systems

LinuxProcess Creation
TA0043 · ReconnaissanceT1592.004 · Client ConfigurationsTA0006 · Credential AccessT1552.001 · Credentials In Files
Florian Roth (Nextron Systems)Mon Jun 20linux
Detectionhighexperimental

Script Interpreter Spawning Credential Scanner - Linux

Detects a script interpreter process (like node.js or bun) spawning a known credential scanning tool (e.g., trufflehog, gitleaks). This behavior is indicative of an attempt to find and steal secrets, as seen in the "Shai-Hulud: The Second Coming" campaign.

LinuxProcess Creation
TA0006 · Credential AccessT1552 · Unsecured CredentialsTA0002 · ExecutionTA0009 · Collection+2
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Nov 25linux
Detectionhightest

Shell Execution Of Process Located In Tmp Directory

Detects execution of shells from a parent process located in a temporary (/tmp) directory

LinuxProcess Creation
TA0002 · Execution
Joseliyo SanchezFri Jun 02linux
Detectionhighexperimental

Mask System Power Settings Via Systemctl

Detects the use of systemctl mask to disable system power management targets such as suspend, hibernate, or hybrid sleep. Adversaries may mask these targets to prevent a system from entering sleep or shutdown states, ensuring their malicious processes remain active and uninterrupted. This behavior can be associated with persistence or defense evasion, as it impairs normal system power operations to maintain long-term access or avoid termination of malicious activity.

LinuxProcess Creation
TA0003 · PersistenceTA0040 · ImpactT1653 · Power Settings
Milad Cheraghi+1Fri Oct 17linux
Detectionhightest

Triple Cross eBPF Rootkit Execve Hijack

Detects execution of a the file "execve_hijack" which is used by the Triple Cross rootkit as a way to elevate privileges

LinuxProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Tue Jul 05linux
Detectionhightest

Triple Cross eBPF Rootkit Install Commands

Detects default install commands of the Triple Cross eBPF rootkit based on the "deployer.sh" script

LinuxProcess Creation
TA0005 · Defense EvasionT1014 · Rootkit
Nasreddine Bencherchali (Nextron Systems)Tue Jul 05linux
Detectionhightest

Vim GTFOBin Abuse - Linux

Detects the use of "vim" and it's siblings commands to execute a shell or proxy commands. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Nasreddine Bencherchali (Nextron Systems)Wed Dec 28linux
Detectionhightest

Linux Webshell Indicators

Detects suspicious sub processes of web server processes

LinuxProcess Creation
TA0003 · PersistenceT1505.003 · Web Shell
Florian Roth (Nextron Systems)+1Fri Oct 15linux
Detectionhightest

Binary Padding - MacOS

Adversaries may use binary padding to add junk data and change the on-disk representation of malware. This rule detect using dd and truncate to add a junk data to file.

macOSProcess Creation
TA0005 · Defense EvasionT1027.001 · Binary Padding
Igor Fits+2Mon Oct 19macos
Detectionhightest

Clipboard Data Collection Via OSAScript

Detects possible collection of data from the clipboard via execution of the osascript binary

macOSProcess Creation
TA0009 · CollectionTA0002 · ExecutionT1115 · Clipboard DataT1059.002 · AppleScript
Sohan G (D4rkCiph3r)Tue Jan 31macos
Detectionhightest

Credentials In Files

Detecting attempts to extract passwords with grep and laZagne

macOSProcess Creation
TA0006 · Credential AccessT1552.001 · Credentials In Files
Igor Fits+2Mon Oct 19macos
Detectionhightest

JXA In-memory Execution Via OSAScript

Detects possible malicious execution of JXA in-memory via OSAScript

macOSProcess Creation
T1059.002 · AppleScriptT1059.007 · JavaScriptTA0002 · Execution
Sohan G (D4rkCiph3r)Tue Jan 31macos
Detectionhightest

Suspicious Microsoft Office Child Process - MacOS

Detects suspicious child processes spawning from microsoft office suite applications such as word or excel. This could indicates malicious macro execution

macOSProcess Creation
TA0002 · ExecutionTA0003 · PersistenceT1059.002 · AppleScriptT1137.002 · Office Test+1
Sohan G (D4rkCiph3r)Tue Jan 31macos
Detectionhightest

OSACompile Run-Only Execution

Detects potential suspicious run-only executions compiled using OSACompile

macOSProcess Creation
T1059.002 · AppleScriptTA0002 · Execution
Sohan G (D4rkCiph3r)Tue Jan 31macos
Detectionhightest

Potential Persistence Via PlistBuddy

Detects potential persistence activity using LaunchAgents or LaunchDaemons via the PlistBuddy utility

macOSProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1543.001 · Launch AgentT1543.004 · Launch Daemon
Sohan G (D4rkCiph3r)Sat Feb 18macos
Detectionhighexperimental

Remote Access Tool - Renamed MeshAgent Execution - MacOS

Detects the execution of a renamed instance of the Remote Monitoring and Management (RMM) tool, MeshAgent. RMM tools such as MeshAgent are commonly utilized by IT administrators for legitimate remote support and system management. However, malicious actors may exploit these tools by renaming them to bypass detection mechanisms, enabling unauthorized access and control over compromised systems.

macOSProcess Creation
TA0011 · Command and ControlTA0005 · Defense Evasionattack.t1219.002T1036.003 · Rename System Utilities
Norbert Jaśniewicz (AlphaSOC)Mon May 19macos
Detectionhightest

Potential Base64 Decoded From Images

Detects the use of tail to extract bytes at an offset from an image and then decode the base64 value to create a new file with the decoded content. The detected execution is a bash one-liner.

macOSProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or Information
Joseliyo SanchezWed Dec 20macos
Detectionhightest

Potential WizardUpdate Malware Infection

Detects the execution traces of the WizardUpdate malware. WizardUpdate is a macOS trojan that attempts to infiltrate macOS machines to steal data and it is associated with other types of malicious payloads, increasing the chances of multiple infections on a device.

macOSProcess Creation
TA0011 · Command and Control
Tim Rauch+1Mon Oct 17macos
Detectionhightest

Cisco Clear Logs

Clear command history in network OS which is used for defense evasion

Ciscoaaa
TA0005 · Defense EvasionT1070.003 · Clear Command History
Austin ClarkMon Aug 12network
Detectionhightest

Cisco Crypto Commands

Show when private keys are being exported from the device, or when new certificates are installed

Ciscoaaa
TA0006 · Credential AccessTA0005 · Defense EvasionT1553.004 · Install Root CertificateT1552.004 · Private Keys
Austin ClarkMon Aug 12network
Detectionhightest

Cisco Disabling Logging

Turn off logging locally or remote

Ciscoaaa
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Austin ClarkSun Aug 11network
Detectionhightest

Cisco Local Accounts

Find local accounts being created or modified as well as remote authentication configurations

Ciscoaaa
TA0004 · Privilege EscalationTA0003 · PersistenceT1136.001 · Local AccountT1098 · Account Manipulation
Austin ClarkMon Aug 12network
Detectionhightest

DNS Query to External Service Interaction Domains

Detects suspicious DNS queries to external service interaction domains often used for out-of-band interactions after successful RCE

dns
TA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0043 · ReconnaissanceT1595.002 · Vulnerability Scanning
Florian Roth (Nextron Systems)+1Tue Jun 07network
Detectionhighstable

Monero Crypto Coin Mining Pool Lookup

Detects suspicious DNS queries to Monero mining pools

dns
TA0040 · ImpactT1496 · Resource HijackingTA0010 · ExfiltrationT1567 · Exfiltration Over Web Service
Florian Roth (Nextron Systems)Sun Oct 24network
Detectionhightest

DNS TXT Answer with Possible Execution Strings

Detects strings used in command execution in DNS TXT Answer

dns
TA0011 · Command and ControlT1071.004 · DNS
Markus NeisWed Aug 08network
Detectionhightest

Wannacry Killswitch Domain

Detects wannacry killswitch domain dns queries

dns
TA0011 · Command and ControlT1071.001 · Web Protocols
Mike WadeWed Sep 16network
Detectionhightest

Default Cobalt Strike Certificate

Detects the presence of default Cobalt Strike certificate in the HTTPS traffic

Zeek (Bro)x509
TA0011 · Command and ControlS0154 · Cobalt Strike
Bhabesh RajWed Jun 23network
Detectionhighexperimental

Suspicious DNS Query Indicating Kerberos Coercion via DNS Object SPN Spoofing - Network

Detects DNS queries containing patterns associated with Kerberos coercion attacks via DNS object spoofing. The pattern "1UWhRCAAAAA..BAAAA" is a base64-encoded signature that corresponds to a marshaled CREDENTIAL_TARGET_INFORMATION structure. Attackers can use this technique to coerce authentication from victim systems to attacker-controlled hosts. It is one of the strong indicators of a Kerberos coercion attack, where adversaries manipulate DNS records to spoof Service Principal Names (SPNs) and redirect authentication requests like CVE-2025-33073.

Zeek (Bro)dns
TA0009 · CollectionTA0006 · Credential AccessTA0003 · PersistenceTA0004 · Privilege Escalation+2
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Jun 20network
Detectionhightest

Publicly Accessible RDP Service

Detects connections from routable IPs to an RDP listener. Which is indicative of a publicly-accessible RDP service.

Zeek (Bro)rdp
TA0008 · Lateral MovementT1021.001 · Remote Desktop Protocol
Josh BrowerSat Aug 22network
Detectionhightest

Possible Impacket SecretDump Remote Activity - Zeek

Detect AD credential dumping using impacket secretdump HKTL. Based on the SIGMA rules/windows/builtin/win_impacket_secretdump.yml

Zeek (Bro)smb_files
TA0006 · Credential AccessT1003.002 · Security Account ManagerT1003.004 · LSA SecretsT1003.003 · NTDS
Samir BousseadenThu Mar 19network
Detectionhightest

First Time Seen Remote Named Pipe - Zeek

This detection excludes known namped pipes accessible remotely and notify on newly observed ones, may help to detect lateral movement and remote exec using named pipes

Zeek (Bro)smb_files
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares
Samir Bousseaden+1Thu Apr 02network
Detectionhightest

Suspicious PsExec Execution - Zeek

detects execution of psexec or paexec with renamed service name, this rule helps to filter out the noise if psexec is used for legit purposes or if attacker uses a different psexec client other than sysinternal one

Zeek (Bro)smb_files
TA0008 · Lateral MovementT1021.002 · SMB/Windows Admin Shares
Samir Bousseaden+1Thu Apr 02network
Detectionhightest

Apache Segmentation Fault

Detects a segmentation fault error message caused by a crashing apache worker process

apache
TA0040 · ImpactT1499.004 · Application or System Exploitation
Florian Roth (Nextron Systems)Tue Feb 28web
Detectionhightest

Nginx Core Dump

Detects a core dump of a crashing Nginx worker process, which could be a signal of a serious problem or exploitation attempts.

nginx
TA0040 · ImpactT1499.004 · Application or System Exploitation
Florian Roth (Nextron Systems)Mon May 31web
Detectionhightest

Windows WebDAV User Agent

Detects WebDav DownloadCradle

Proxy Log
TA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)Fri Apr 06web
Detectionhightest

HackTool - CobaltStrike Malleable Profile Patterns - Proxy

Detects cobalt strike malleable profiles patterns (URI, User-Agents, Methods).

Proxy Log
TA0005 · Defense EvasionTA0011 · Command and ControlT1071.001 · Web Protocols
Markus Neis+1Thu Feb 15web
Detectionhightest

HackTool - Empire UserAgent URI Combo

Detects user agent and URI paths used by empire agents

Proxy Log
TA0005 · Defense EvasionTA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)Mon Jul 13web
Detectionhightest

Raw Paste Service Access

Detects direct access to raw pastes in different paste services often used by malware in their second stages to download malicious code in encrypted or encoded form

Proxy Log
TA0011 · Command and ControlT1071.001 · Web ProtocolsT1102.001 · Dead Drop ResolverT1102.003 · One-Way Communication+1
Florian Roth (Nextron Systems)Thu Dec 05web
Detectionhightest

Flash Player Update from Suspicious Location

Detects a flashplayer update from an unofficial location

Proxy Log
TA0001 · Initial AccessT1189 · Drive-by CompromiseTA0002 · ExecutionT1204.002 · Malicious File+2
Florian Roth (Nextron Systems)Wed Oct 25web
Detectionhightest

APT User Agent

Detects suspicious user agent strings used in APT malware in proxy logs

Proxy Log
TA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)+1Tue Nov 12web
Detectionhightest

Bitsadmin to Uncommon IP Server Address

Detects Bitsadmin connections to IP addresses instead of FQDN names

Proxy Log
TA0011 · Command and ControlT1071.001 · Web ProtocolsTA0005 · Defense EvasionTA0003 · Persistence+2
Florian Roth (Nextron Systems)Fri Jun 10web
Detectionhightest

Bitsadmin to Uncommon TLD

Detects Bitsadmin connections to domains with uncommon TLDs

Proxy Log
TA0011 · Command and ControlT1071.001 · Web ProtocolsTA0005 · Defense EvasionTA0003 · Persistence+2
Florian Roth (Nextron Systems)+1Thu Mar 07web
Detectionhightest

Crypto Miner User Agent

Detects suspicious user agent strings used by crypto miners in proxy logs

Proxy Log
TA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)Mon Oct 21web
Detectionhightest

Exploit Framework User Agent

Detects suspicious user agent strings used by exploit / pentest frameworks like Metasploit in proxy logs

Proxy Log
TA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)Sat Jul 08web
Detectionhightest

Hack Tool User Agent

Detects suspicious user agent strings user by hack tools in proxy logs

Proxy Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0006 · Credential AccessT1110 · Brute Force
Florian Roth (Nextron Systems)Sat Jul 08web