heroui logo

Trickbot Named Pipe

Splunk Security Content

View Source
Summary
The "Trickbot Named Pipe" rule is designed to detect the creation or connection to a named pipe used by the Trickbot malware, a prevalent threat known for its capability to facilitate data exfiltration and maintain command and control (C2) communication. Utilizing Sysmon Event Codes 17 and 18, the detection focuses on named pipes matching the regex pattern "\\pipe\\*lacesomepipe". This behavior is critical as it outlines Trickbot's mechanism for covert communications, allowing for persistence on infected hosts, arbitrary command execution, and potential data theft. Implementing this rule requires proper log ingestion from endpoints equipped with Sysmon, ensuring that both event IDs relevant to named pipes are correctly captured. Continuous monitoring and analysis of the generated alerts can help to identify and mitigate threats posed by Trickbot effectively.
Categories
  • Endpoint
  • Windows
  • Infrastructure
Data Sources
  • Named Pipe
  • Process
ATT&CK Techniques
  • T1055
Created: 2024-11-13