0
Fibratus Rules
0
LimaCharlie Rules
0
MITRE Tactics
0
Ransomware Detections

Initial Access & Discovery

APT campaigns, exploit detection, and reconnaissance patterns.

Kimsuky DEEP#GOSU Multi-Stage Execution
VBScript/WSH spawning encoded PowerShell commands, North Korean APT chain
TA0005 Fibratus CRITICAL +
Potential ClickFix Chain
Explorer.exe → LOLBins via Run dialog with malicious command-line patterns and callstack analysis
T1204 T1566 HIGH +
Palo Alto GlobalProtect CVE-2024-3400
Command injection, CVSS 10.0, PanGPS.exe spawning cmd/powershell/whoami
TA0001 Fibratus CRITICAL +
SocGholish Fake Browser Update Campaign
.js download → scheduled task persistence within 5 minutes
TA0001 Fibratus CRITICAL +
M365 - Suspicious User Agent on Login
23 suspicious user agents: automation tools (axios, python-requests, curl), pentesting (Burp, Nikto, sqlmap), Entra ID attack tools (AADInternals, ROADtools), empty UA strings
T1078T1110 LimaCharlie MEDIUM +

Execution

Hack tools, suspicious process patterns, and malicious code execution.

CrackMapExec Execution Patterns
cmd.exe output redirection to SMB shares, PowerShell encoding patterns unique to CME
T1047 Fibratus HIGH +
Empire PowerShell Launch Parameters
Specific flag combinations: -NoP -sta -NonI -W Hidden -Enc used by Empire stagers
T1059.001 Fibratus HIGH +
PowerShell Script Execution from C:\Users\Public
PowerShell -f/-fi/-fil/-file flags pointing to the world-writable Public folder
T1059.001 Fibratus HIGH +
Critical Unsigned Executable Pattern
50ms sequence: unsigned LoadImage → directory enum with READ|WRITE → PAGEFILE mapping
T1486 Fibratus CRITICAL +
React2Shell - Node.js execSync Suspicious Command
CVE-2025-55182 — cmd.exe spawned by node.exe with Next.js/React parent context + recon or post-exploitation commands via child_process.execSync()
T1059.003T1190 LimaCharlie CRITICAL +

Persistence

Scheduled tasks, hidden accounts, and maintaining access.

Hidden Local User Account via Registry
lsass.exe modifying SAM registry with $ suffix indicating hidden account creation
T1136.001 Fibratus HIGH +
PowerSploit/Empire Scheduled Task Persistence
Default "Updater" task with PowerShell -NonI and ONLOGON/DAILY/IDLE/HOURLY triggers
T1053.005 Fibratus HIGH +
M365 - Dynamic Group Membership Rule Modified
Entra ID dynamic group rule change — stealthy privilege escalation by modifying attribute-based membership to auto-add attacker accounts to privileged groups
T1098T1484 LimaCharlie HIGH +

Defense Evasion

Defender tampering, masquerading, and security tool bypass.

Renamed NetSupport RAT Execution
NetSupport product metadata on non-client32.exe binary, masquerading detection
T1036 Fibratus HIGH +
Suspicious Hosts File Access
Editors or scripting engines opening Windows hosts file for DNS hijacking
T1562.001 Fibratus HIGH +
Windows Defender Disabling Attempt
DisableRealtimeMonitoring set to 1 via registry modification
T1562.001 Fibratus CRITICAL +
Windows Defender Exclusion Modification
Exclusion paths, extensions, or processes added via registry or MpCmdRun
T1562.001 Fibratus HIGH +

Credential Access

Credential dumping and harvesting tools.

Remote Credential Dumping via CrackMapExec/Impacket
svchost.exe creating 8-char random .tmp files in System32 during SAM/SECURITY/SYSTEM dump
T1003 Fibratus HIGH +
M365 - AiTM Session Token Replay
Detects MFA bypass via stolen session tokens — "previously satisfied" or "claim in token" authentication indicating Evilginx/AiTM phishing toolkit replay
T1539T1550 LimaCharlie CRITICAL +

Command & Control

RATs, C2 comms, reverse shells, and tunneling.

NetSupport RAT Detection
Multi-event detection: process execution, file drops, config files — covers naming variations and suspicious paths
T1219 T1036 HIGH +
Suspicious DNS Query Detection
C2 domains, DNS tunneling TLDs (.tk/.xyz/.onion), file-sharing abuse, dynamic DNS providers
T1071.004 Fibratus HIGH +
VPN and Proxy Detection
Three vectors: process cmdline, DNS queries, and network connections to VPN/proxy/SSH tunnel providers
T1090 Fibratus HIGH +
Reverse Shell Detection
30+ process names, 50+ cmdline indicators: bash -i, nc -e, python sockets, ConPtyShell, encoded PS
T1059 Fibratus CRITICAL +

Impact / Ransomware

8 kernel-level ransomware detections using ETW File I/O sequence analysis with tight timing windows (2ms to 50ms). These catch ransomware during initialization and active encryption by fingerprinting the exact file operation sequences different families use.

Gamma Hive Vipasana LockBit Cerber Generic Patterns
Gamma Ransomware (PyInstaller Unpacking)
_MEI temp directory DLL creation: api-ms-win-*, VCRUNTIME140, python37.dll cluster
T1486 Fibratus CRITICAL +
Generic Ransomware Initialization (Hive+)
27ms: PAGEFILE(16384) → Windows dir → wow64.dll → System32 enum → kernel32.dll
T1486 Fibratus CRITICAL +
Vipasana Ransomware Initialization
45ms: PAGEFILE → Windows → wow64*.dll → Desktop folder → SysWOW64 DLL
T1486 Fibratus CRITICAL +
Ransomware File I/O: Enum / Delete / Create / Read / Write
2ms: unsigned process performing classic encrypt cycle on user folders
T1486 Fibratus CRITICAL +
Ransomware File-to-File with Delete
17ms: open → read → create encrypted copy → write → delete original
T1486 Fibratus CRITICAL +
Ransomware File-to-File with Rename and Delete
16ms LockBit pattern: open → create temp → write → rename → delete original
T1486 Fibratus CRITICAL +
Ransomware Memory-to-File Post-Overwrite (Cerber)
15ms by file.object: open → read → write → write(size>0) → rename/delete
T1486 Fibratus CRITICAL +
Ransomware Memory-to-File Pre-Overwrite (Wiper)
2ms destructive: open → rename to backup → overwrite with encrypted data
T1486 Fibratus CRITICAL +

Use these detections

All detections are open source on GitHub. Use them, adapt them, make them better.

Go to GitHub