
Summary
This detection rule focuses on identifying antivirus alerts that occur in high-risk file paths or with filenames that are known to be associated with malicious activity. The rule emphasizes the importance of investigating the antivirus alert, regardless of whether the malware has been blocked, to understand how it was introduced into the system. The detection is triggered when files in specific paths like 'Temp', 'PerfLogs', or common web server directories such as 'inetpub' are flagged, particularly if they have extensions often related to scripts or executable files. This proactive approach helps in understanding potential vulnerabilities in the system and mitigating further risks by addressing the origin of the malware.
Categories
- Endpoint
Data Sources
- File
- Application Log
- Malware Repository
Created: 2018-09-09