-
-
Notifications
You must be signed in to change notification settings - Fork 2.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Create image_load_susp_dotnet_csharp_streamer_rat.yml #4885
Conversation
Adding new detection for CSharp Streamer Rat
Fixing wording
…susp_dotnet_csharp_streamer_rat.yml
Thanks for the contribution @LucaInfoSec. Just a quick question did you check the code to verify the length and the allowed characters for the filename? If so, can you please share an SS or a link? From the DFIR report link and the cyber.wtf there isn't a direct evidence. Thanks |
Hi @nasbench, Unfortunately no, I could not get my hands on a sample of the malware so the two examples of this \dat[0-9A-Z]{4}.tmp format is the two examples provided in the report: If this is not enough we can close the PR until I have more concrete evidence of this. |
Summary of the Pull Request
Sigma rule for the CSharp Streamer RAT.
Detection is based on the default file name and path used by the CSharp Streamer RAT to write and load .NET executables.
References here:
- https://thedfirreport.com/2024/06/10/icedid-brings-screenconnect-and-csharp-streamer-to-alphv-ransomware-deployment/#detections
- https://cyber.wtf/2023/12/06/the-csharp-streamer-rat/
Changelog
new: Potential CSharp Streamer RAT Loading .NET Executable Image
Example Log Event
Fixed Issues
N/A
SigmaHQ Rule Creation Conventions