
Summary
This detection rule is designed to identify the execution of the MEGAsync and MegaCMD applications, which are associated with the Mega cloud storage service. Threat actors commonly exploit these tools to exfiltrate sensitive data due to their support for end-to-end encryption and anonymity in transactions. The rule utilizes Splunk logic to filter for system events where the process name matches 'megasync.exe' or 'megacmd'. It focuses on Event Code 1 which denotes process creation and collects relevant details like timestamp, host, user, and process attributes. By analyzing the Sysmon logs, it captures indications of unauthorized data exfiltration attempts via these Mega utilities, allowing for proactive threat detection and incident response actions.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
ATT&CK Techniques
- T1567
Created: 2024-02-09