Rule Library

Sigma Rules

6 rules found for "Omar Khaled"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Hidden Flag Set On File/Directory Via Chflags - MacOS

Detects the execution of the "chflags" utility with the "hidden" flag, in order to hide files on MacOS. When a file or directory has this hidden flag set, it becomes invisible to the default file listing commands and in graphical file browsers.

macOSProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessTA0011 · Command and ControlT1218 · System Binary Proxy Execution+3
Omar KhaledWed Aug 21macos
Detectionmediumtest

Disk Image Creation Via Hdiutil - MacOS

Detects the execution of the hdiutil utility in order to create a disk image.

macOSProcess Creation
TA0010 · Exfiltration
Omar KhaledSat Aug 10macos
Detectionmediumtest

Disk Image Mounting Via Hdiutil - MacOS

Detects the execution of the hdiutil utility in order to mount disk images.

macOSProcess Creation
TA0001 · Initial AccessTA0009 · CollectionT1566.001 · Spearphishing AttachmentT1560.001 · Archive via Utility
Omar KhaledSat Aug 10macos
Detectionmediumtest

DNS Query To Put.io - DNS Client

Detects DNS queries for subdomains related to "Put.io" sharing website.

Windowsdns-client
TA0011 · Command and Control
Omar KhaledFri Aug 23windows
Detectionmediumtest

Data Export From MSSQL Table Via BCP.EXE

Detects the execution of the BCP utility in order to export data from the database. Attackers were seen saving their malware to a database column or table and then later extracting it via "bcp.exe" into a file.

WindowsProcess Creation
TA0002 · ExecutionTA0010 · ExfiltrationT1048 · Exfiltration Over Alternative Protocol
Omar Khaled+2Tue Aug 20windows
Detectionhightest

Driver Added To Disallowed Images In HVCI - Registry

Detects changes to the "HVCIDisallowedImages" registry value to potentially add a driver to the list, in order to prevent it from loading.

WindowsRegistry Set
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)+1Tue Dec 05windows