heroui logo

Antivirus Exploitation Framework Detection

Sigma Rules

View Source
Summary
The 'Antivirus Exploitation Framework Detection' rule is designed to identify significant alerts generated by antivirus software concerning known exploitation frameworks. These frameworks, such as Cobalt Strike and Metasploit, are often utilized by attackers to execute malicious activities post-compromise. While the presence of such alerts indicates that the antivirus blocked a threat, it is critical for security teams to investigate the underlying intrusion vectors that allowed such malware to appear on the system. The rule utilizes specified signatures that denote various exploitation tools, ensuring that any related activity is flagged for immediate attention. The detection method relies on the capability of antivirus log sources to capture and report these specific signature matches, making it a proactive measure against advanced threats. Continuous monitoring of these alerts can aid in uncovering potential vulnerabilities and understanding attacker tactics.
Categories
  • Endpoint
  • Windows
  • Linux
  • Cloud
Data Sources
  • User Account
  • Process
  • Logon Session
  • Application Log
  • Network Traffic
Created: 2018-09-09