
Summary
The 'Antivirus Password Dumper Detection' rule is designed to identify critical alerts generated by antivirus solutions when they detect password extraction malware. This detection is vital as it not only acknowledges the potential threats that have been blocked by the antivirus but also emphasizes the importance of understanding how such threats infiltrated the system in the first place. The rule focuses on specific malware signatures and variants known for credential dumping, including well-known tools like Mimikatz, Rubeus, and various PowerShell modules. Given the nature of these threats, this detection is classified with a 'critical' severity level, indicating that any alerts generated should prompt immediate investigation. It operates under the assumption that even if the antivirus successfully blocks the malware, the presence of such a tool on the system raises significant security concerns that warrant further analysis to prevent future incidents.
Categories
- Endpoint
- Windows
- Linux
- macOS
Data Sources
- Pod
- Container
- User Account
- Malware Repository
- Application Log
- Network Traffic
- Process
Created: 2018-09-09