Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Create new rule - Potential SSH Tunnel Persistence Install Using A Scheduled Task #5146

Open
wants to merge 2 commits into
base: master
Choose a base branch
from

Conversation

resp404nse
Copy link

Summary of the Pull Request

Create new rule Potential SSH Tunnel Persistence Install Using A Scheduled Task

Changelog

new: Potential SSH Tunnel Persistence Install Using A Scheduled Task

Example Log Event

Fixed Issues

SigmaHQ Rule Creation Conventions

  • If your PR adds new rules, please consider following and applying these conventions

Submission of new proposed rule to detect the creation of Scheduled tasks that use OpenSSH to establish an SSH tunnel to attackers server.
@github-actions github-actions bot added Rules Windows Pull request add/update windows related rules labels Dec 30, 2024
Copy link
Contributor

@github-actions github-actions bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Welcome @resp404nse 👋

It looks like this is your first pull request on the Sigma rules repository!

Please make sure to read the SigmaHQ conventions document to make sure your contribution is adhering to best practices and has all the necessary elements in place for a successful approval.

Thanks again, and welcome to the Sigma community! 😃

Copy link
Member

@frack113 frack113 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Only yaml review , I did not check the logic detection.
I am AFK for holidays.

Comment on lines +5 to +7
references:
- https://thedfirreport.com/2023/10/30/netsupport-intrusion-results-in-domain-compromise/
- https://www.kroll.com/en/insights/publications/cyber/cactus-ransomware-prickly-new-variant-evades-detection
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
references:
- https://thedfirreport.com/2023/10/30/netsupport-intrusion-results-in-domain-compromise/
- https://www.kroll.com/en/insights/publications/cyber/cactus-ransomware-prickly-new-variant-evades-detection
references:
- https://thedfirreport.com/2023/10/30/netsupport-intrusion-results-in-domain-compromise/
- https://www.kroll.com/en/insights/publications/cyber/cactus-ransomware-prickly-new-variant-evades-detection

Comment on lines +15 to +16
- attack.commandandcontrol
- attack.T1053.005
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- attack.commandandcontrol
- attack.T1053.005
- attack.command-and-control

https://github.com/SigmaHQ/sigma-specification/blob/main/appendix/sigma-tags-appendix.md

condition: all of selection_*
falsepositives:
- Unknown
level: high
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
level: high
level: high

- https://www.kroll.com/en/insights/publications/cyber/cactus-ransomware-prickly-new-variant-evades-detection
author: Rory Duncan
date: 2024-12-30
modified: 2024-12-30
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
modified: 2024-12-30

As it is a new rule no need to modified it already 😉

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Rules Windows Pull request add/update windows related rules
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants