Skip to content

Commit

Permalink
Merge pull request SigmaHQ#679 from Iveco/master
Browse files Browse the repository at this point in the history
add LDAPFragger detections
  • Loading branch information
Neo23x0 authored Mar 28, 2020
2 parents 0e973d1 + 55258e1 commit 597d914
Show file tree
Hide file tree
Showing 2 changed files with 58 additions and 0 deletions.
28 changes: 28 additions & 0 deletions rules/windows/builtin/win_susp_ldap_dataexchange.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,28 @@
title: Suspicious LDAP-Attributes Used
id: d00a9a72-2c09-4459-ad03-5e0a23351e36
description: detects the usage of particular AttributeLDAPDisplayNames, which are known for data exchange via LDAP by the tool LDAPFragger and are additionally not commonly used in companies.
status: experimental
date: 2019/03/24
author: xknow @xknow_infosec
references:
- https://medium.com/@ivecodoe/detecting-ldapfragger-a-newly-released-cobalt-strike-beacon-using-ldap-for-c2-communication-c274a7f00961
- https://blog.fox-it.com/2020/03/19/ldapfragger-command-and-control-over-ldap-attributes/
- https://github.com/fox-it/LDAPFragger
tags:
- attack.t1041
- attack.persistence
logsource:
product: windows
service: security
detection:
selection:
EventID: 5136
AttributeValue: '*'
AttributeLDAPDisplayName:
- 'primaryInternationalISDNNumber'
- 'otherFacsimileTelephoneNumber'
- 'primaryTelexNumber'
condition: selection
falsepositives:
- Companies, who may use these default LDAP-Attributes for personal information
level: high
30 changes: 30 additions & 0 deletions rules/windows/sysmon/sysmon_susp_adsi_cache_usage.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
title: Suspicious ADSI-Cache Usage By Unknown Tool
id: 75bf09fa-1dd7-4d18-9af9-dd9e492562eb
description: detects the usage of ADSI (LDAP) operations by tools. This may also detect tools like LDAPFragger.
status: experimental
date: 2019/03/24
author: xknow @xknow_infosec
references:
- https://medium.com/@ivecodoe/detecting-ldapfragger-a-newly-released-cobalt-strike-beacon-using-ldap-for-c2-communication-c274a7f00961
- https://blog.fox-it.com/2020/03/19/ldapfragger-command-and-control-over-ldap-attributes/
- https://github.com/fox-it/LDAPFragger
tags:
- attack.t1041
- attack.persistence
logsource:
product: windows
service: sysmon
detection:
selection_1:
EventID: 11
TargetFilename: '*\Local\Microsoft\Windows\SchCache\*.sch'
selection_2:
Image|contains:
- 'C:\windows\system32\svchost.exe'
- 'C:\windows\system32\dllhost.exe'
- 'C:\windows\system32\mmc.exe'
- 'C:\windows\system32\WindowsPowerShell\v1.0\powershell.exe'
condition: selection_1 and not selection_2
falsepositives:
- Other legimate tools, which do ADSI (LDAP) operations, e.g. any remoting activity by MMC, Powershell, Windows etc.
level: high

0 comments on commit 597d914

Please sign in to comment.