[Emerging-Sigs] Credential Dumping Rule

Pedro Marinho pppmarinho at gmail.com
Tue Apr 30 11:20:05 HDT 2019

Hey everybody,

Based on this https://attack.mitre.org/techniques/T1003/

After running the procdump to get a lsass.exe Memory Dump I got back a MDMP
file. I left the magic out of the rule.

alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"ET TROJAN Windows
procdump Dump File Exfiltration"; flow:established,to_server; content:ā€|00
2a 00 2a 00 2a 00 20 00|p|00|r|00|o|00|c|00|d|00|u|00|m|00|p|00|6|00|4|00
2e 00|e|00|x|00|eā€; fast_pattern:9,20;  classtype:trojan-activity;
sid:7777777; rev:1; reference:url,attack.mitre.org/techniques/T1003/;
metadata:affected_product Windows_XP_Vista_7_8_10_Server_64_Bit,
attack_target Client_and_Server, deployment Perimeter, deployment
Datacenter, signature_severity Critical, created_at 2019_04_30,
performance_impact Low, updated_at 2019_04_30;)
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.emergingthreats.net/pipermail/emerging-sigs/attachments/20190430/1f5dfa92/attachment.html>

More information about the Emerging-sigs mailing list