heroui logo

HackTool - SILENTTRINITY Stager Execution

Sigma Rules

View Source
Summary
This detection rule identifies the execution of the SILENTTRINITY stager by analyzing Windows process creation events for specific metadata. The rule focuses on the presence of the description containing the term 'st2stager', which is indicative of the SILENTTRINITY stager being invoked. With a high alert level, it aims to help security teams detect and respond to potential use of this advanced command-and-control tool in their environments. It is essential for organizations to be aware of such tools, as they can facilitate malicious activities, such as remote access and exploitation of systems.
Categories
  • Windows
  • Endpoint
  • Network
Data Sources
  • Process
Created: 2019-10-22