Skip to content

Latest commit

 

History

History
19 lines (17 loc) · 3.13 KB

r_m_unix_unix_Ransomware.md

File metadata and controls

19 lines (17 loc) · 3.13 KB

Rules by Product and UseCase

Vendor: Unix

Product: Unix

Use-Case: Ransomware

Rules Models MITRE ATT&CK® TTPs Activity Types Parsers
5 0 13 6 88
Event Type Rules Models
authentication-failed T1078 - Valid Accounts
Auth-Ransomware-Shost-Failed: User authentication or login failure from a known ransomware IP
authentication-successful T1078 - Valid Accounts
Auth-Ransomware-Shost: User authentication or login from a known ransomware IP
failed-logon T1078 - Valid Accounts
Auth-Ransomware-Shost-Failed: User authentication or login failure from a known ransomware IP
file-write T1486 - Data Encrypted for Impact
FA-EXT: A file has been written and is suspected of Ransomware on host
process-created T1059 - Command and Scripting Interperter
A-WannaCry: Artifacts seen by WannaCry malware have been observed on this asset

T1059.003 - T1059.003
A-WannaCry: Artifacts seen by WannaCry malware have been observed on this asset

T1222 - File and Directory Permissions Modification
A-WannaCry: Artifacts seen by WannaCry malware have been observed on this asset

T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification
A-WannaCry: Artifacts seen by WannaCry malware have been observed on this asset

T1486 - Data Encrypted for Impact
A-WannaCry: Artifacts seen by WannaCry malware have been observed on this asset

T1490 - Inhibit System Recovery
A-WannaCry: Artifacts seen by WannaCry malware have been observed on this asset

T1070 - Indicator Removal on Host
NotPetya-Activity: NotPetya Ransomware Activity detected on this asset
A-Fsutil-Sus-Invocation: Suspicious parameters of fsutil were detected on this asset.

T1003 - OS Credential Dumping
NotPetya-Activity: NotPetya Ransomware Activity detected on this asset

T1003.001 - T1003.001
NotPetya-Activity: NotPetya Ransomware Activity detected on this asset

T1070.001 - Indicator Removal on Host: Clear Windows Event Logs
NotPetya-Activity: NotPetya Ransomware Activity detected on this asset

T1218 - Signed Binary Proxy Execution
NotPetya-Activity: NotPetya Ransomware Activity detected on this asset

T1218.011 - Signed Binary Proxy Execution: Rundll32
NotPetya-Activity: NotPetya Ransomware Activity detected on this asset
remote-logon T1078 - Valid Accounts
Auth-Ransomware-Shost: User authentication or login from a known ransomware IP