heroui logo

PUA - Rclone Execution

Sigma Rules

View Source
Summary
This detection rule focuses on identifying the execution of the RClone utility, a tool frequently utilized for file synchronization and transfer to cloud storage solutions. RClone has gained notoriety for its use in data exfiltration by several ransomware operations, including REvil, Conti, and FiveHands. The rule captures command-line invocations where certain key arguments related to configuration and certificate handling are present. It also inspects the image name to ensure that it pertains to RClone, specifically targeting ‘rclone.exe’. Additionally, variations of command-line parameters that suggest possible ransomware-related activity (like 'copy', 'sync', and cloud storage providers such as 'mega') are part of the detection criteria. This enables the rule to uncover malicious or unwanted use of RClone in environments where data security is critical, especially in the context of ransomware that seeks to steal data before encryption.
Categories
  • Endpoint
  • Cloud
  • Windows
Data Sources
  • Process
Created: 2021-05-10