
Summary
This detection rule identifies potential activity related to the NetWire Remote Access Trojan (RAT) by monitoring for specific registry key creations. The rule is aimed at listing events where a registry key under '\software\NetWire' is created. Such detections are crucial for identifying instances of the NetWire RAT, which is known to be spread through various means such as phishing and has evolved over time to evade existing security measures. By focusing on registry changes, the rule targets a common characteristic of malware infections that utilize this RAT to establish persistence and control within the victim's system. Keeping systems protected against RATs like NetWire is essential for maintaining cybersecurity posture, and this specific rule contributes to early threat detection and response strategies.
Categories
- Windows
- Endpoint
Data Sources
- Windows Registry
Created: 2021-10-07