heroui logo

Octopus Scanner Malware

Sigma Rules

View Source
Summary
The Octopus Scanner Malware detection rule is designed to identify the presence of specific malicious file activity on Windows systems. By monitoring file events, this rule looks for files with names that indicate they may have been manipulated or created by the Octopus Scanner malware variant. The targeting is specific to two files: 'Cache134.dat' within the Cache folder of a user's local Microsoft directory and 'ExplorerSync.db' found in the same location. The detection utilizes the endswith condition to ensure that the exact filenames are captured, providing focused detection of this malware variant. This rule is particularly critical given the malware's threat level is marked as high, indicating its potential for damage or data compromise within target systems. In continuously evolving malicious software landscapes, implementing this detection rule can assist organizations in real-time monitoring and response to potential security incidents involving Octopus Scanner.
Categories
  • Windows
Data Sources
  • File
Created: 2020-06-09