Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Rule devel #976

Merged
merged 6 commits into from
Aug 17, 2020
Merged

Rule devel #976

merged 6 commits into from
Aug 17, 2020

Conversation

diskurse
Copy link
Contributor

Detections for the PS implementation of DNSCat2 and for "Mouse Lock"

diskurse and others added 6 commits August 13, 2020 12:06
The PowerShell implementation of DNSCat2 calls nslookup to craft queries. Counting nslookup processes spawned by PowerShell will show hundreds or thousands of instances if PS DNSCat2 is active locally.
In Kaspersky's 2020 Incident Response Analyst Report they listed legitimate tool "Mouse Lock" as being used for both credential access and collection in security incidents.
In Kaspersky's 2020 Incident Response Analyst Report they listed legitimate tool "Mouse Lock" as being used for both credential access and collection in security incidents.
@Neo23x0 Neo23x0 merged commit da54e89 into SigmaHQ:rule-devel Aug 17, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants