heroui logo

BloodHound Collection Files

Sigma Rules

View Source
Summary
This detection rule identifies potentially malicious activities associated with the BloodHound collection tool, specifically by monitoring file events for outputs generated by the SharpHound collector. The rule is designed to catch specific filenames, such as 'BloodHound.zip' and various JSON files that end in '_computers.json', '_users.json', etc., which are standard outputs from the BloodHound tool used in Active Directory enumeration and discovery. The detection logic includes a selection for these specific filenames and adds a filter to potentially reduce false positives by excluding results related to 'svchost.exe' and certain Microsoft application paths. Given the nature of the tool and its association with reconnaissance activities, this rule has a high confidence level but may require tuning to address environmental noise.
Categories
  • Windows
Data Sources
  • File
Created: 2022-08-09