heroui logo

Potential Winnti Dropper Activity

Sigma Rules

View Source
Summary
This detection rule identifies potential malicious activity related to the Winnti group, which is known for its use of dropper files. The rule focuses on specific file drops as outlined in the RedMimicry Winnti playbook, particularly targeting files that are often associated with these malicious operations. The detection logic looks for file events on Windows systems where the target filename ends with either '\gthread-3.6.dll', '\sigcmm-2.4.dll', or is a batch script located at '\Windows\Temp\tmp.bat'. Given the complexity around file dropping and evasion techniques, this detection is crucial for identifying potential compromise indicators. The rule is categorized under high severity, emphasizing its importance in monitoring for advanced persistent threats.
Categories
  • Windows
Data Sources
  • File
Created: 2020-06-24