
Summary
This detection rule, authored by Florian Roth and David André, focuses on monitoring for the creation of specific file types associated with the Mimikatz tool, particularly files ending with '.kirbi' and 'mimilsa.log'. Mimikatz is commonly used in credential access attacks, specifically for Kerberoasting, where attackers exploit Kerberos authentication to obtain service tickets. The rule is designed to identify instances where these files are created on endpoints running a Windows operating system, a key indicator of an ongoing or potential attack. The detection logic inspects file events and triggers when a file creation event matches the specified targets. False positives are considered unlikely, making this a crucial rule for identifying potential breaches related to credential theft and manipulation.
Categories
- Endpoint
- Windows
Data Sources
- File
Created: 2021-11-08