Valhalla Logo
currently serving 22845 YARA rules and 4217 Sigma rules
API Key

New Rules per Day

Newest YARA Rules

This table shows the newest additions to the YARA rule set

Rule
Description
Date
Ref
EXPL_RAR_Archive_With_Path_Traversal_Aug25
Detects RAR archives abused for path traversal like CVE-2025-8088 and CVE-2025-6218
11.08.2025
MAL_XTinyLoader_Aug25
Detects XTinyLoader that acts as both a loader and a stealer
08.08.2025
MAL_PY_PyLangGhost_Auto_Module_Aug25
Detects a Python module of PyLangGhost that Collects configuration data from cryptocurrency browser extensions and login artifacts, including credentials and cookies, from Google Chrome.
08.08.2025
MAL_PY_PyLangGhost_Nvidia_Module_Aug25
Detects a Python module of PyLangGhost that establish persistence, continuously listening for new instructions from the C2 server. Additionally, it supports standalone execution with specific command-line arguments, enabling it to immediately perform actions such as stealing cookies or login data.
08.08.2025
MAL_PY_PyLangGhost_Command_Module_Aug25
Detects a Python module of PyLangGhost that acts as a dispatcher, interpreting both malware logic and C2 communications, and executing instructions accordingly
08.08.2025
MAL_PY_PyLangGhost_Util_Module_Aug25
Detects a Python module of PyLangGhost that compresses files in-memory, extracts .tar.gz files from memory to disk, validates routes to prevent path transversal
08.08.2025
MAL_Kmlog_Aug25
Detects Kmlog a simple keylogger that logs every keystroke
07.08.2025
SUSP_Scheduled_Task_Java_JAR_Aug25
Detects scheduled tasks that execute Java JAR files, which is suspicious but not necessarily malicious
07.08.2025
SUSP_JAVA_Loader_Indicators_Aug25
Detects indicators of a Java loader used in phishing campaigns
07.08.2025
MAL_JAVA_Loader_Final_Jar_Aug25
Detects a final Java loader JAR file used in phishing campaigns
07.08.2025
SUSP_JAVA_Class_Allatori_Obfuscator_Aug25
Detects a relatively small Java class file obfuscated by Allatori Obfuscator
07.08.2025
MAL_SoupDealer_Aug25_1
Detects obfuscation function used by SoupDealer a Stealth Java loader Used in Phishing Campaigns Targeting Turkey, although matches other malwares that uses same method
07.08.2025
SUSP_SoupDealer_Aug25_2
Detects obfuscation function used by SoupDealer a Stealth Java loader Used in Phishing Campaigns Targeting Turkey, although matches other malwares that uses same method
07.08.2025
MAL_SoupDealer_Final_Payload_Aug25
Detects SoupDealer a Stealth Java loader Used in Phishing Campaigns Targeting Turkey
07.08.2025
HKTL_EDR_BamboozlEDR_Aug25
Detects BamboozlEDR, a tool used to bypass or blind ETW monitoring solutions
07.08.2025
HKTL_EDR_BamboozlEDR_Aug25_1
Detects BamboozlEDR, a tool used to bypass or blind ETW monitoring solutions
07.08.2025
SUSP_PS1_Dropper_Indicators_Aug25
Detects indicators of PowerShell dropper scripts that download and execute malicious payloads
06.08.2025
MAL_SharpHostInfo_Aug25
Detects SharpHostInfo that collects host and domain info on Windows environments
05.08.2025
MAL_StormDNS_Aug25
Detects StormDNS, a DNS shell used by Storm-260 to receive and execute commands from a C2.
05.08.2025
MAL_Lockbit_Loader_Aug25
Detects Lockbit ransomware loader
05.08.2025
MAL_AV_Terminator_Aug25
Detects Custom Antivirus Terminator
05.08.2025
MAL_RANSOM_Warlock_Aug25
Detects Warlock ransomware
05.08.2025
SUSP_HKTL_ELF_Nim_Indicators_Aug25
Detects Nim ELF binaries with specific hacktool indicators
04.08.2025
SUSP_HKTL_Nim_Indicators_Aug25
Detects Nim binaries with specific hacktool indicators
04.08.2025
SUSP_Nim_Indicators_Aug25
Detects Nim binaries with specific indicators
04.08.2025
HKTL_Rust_C2_Malefic_Aug25
Detects a specific proof-of-concept for remote mapping injection that uses shared memory and cross-process mapping to inject and execute code. This rule targets the unmodified POC and doesn't cover obfuscated or alternative implementations.
04.08.2025
HKTL_CrossProcMapping_POC_Aug25
Detects a specific proof-of-concept for remote mapping injection that uses shared memory and cross-process mapping to inject and execute code. This rule targets the unmodified POC and doesn't cover obfuscated or alternative implementations.
04.08.2025
SUSP_Implant_Indicators_Aug25
Detects indicators found in a set of implants
04.08.2025
APT_MAL_RokRAT_Loader_Aug25
Detects RokRAT loader used by APT37
04.08.2025
MAL_CobaltStrike_Loader_Aug25
Detects CobaltStrike loader
04.08.2025

Successful YARA Rules in Set

This table shows statistics of the best rules with lowest AV detection rates (rules created in the last 12 months, matches of the last 14 days)

Rule
Average AV Detection Rate
Sample Count
Info
VT
MAL_GuLoader_Shellcode_Oct22_3
0.0
20
SUSP_MAL_EXFIL_Stealer_Output_Characteristics_Sep22_1
0.04
180
SUSP_PY_OBFUSC_Berserker_Indicators_Dec22_1
0.21
14
SUSP_BAT_OBFUSC_Apr23_2
0.59
64
SUSP_Encrypted_ZIP_Suspicious_Contents_Jul23_1_File
0.64
11
SUSP_PUA_RustDesk_Apr23_1
0.68
22
SUSP_BAT_PS1_Combo_Jan23_2
0.71
45
SUSP_JS_OBFUSC_Feb23_2
1.04
1736
SUSP_WEvtUtil_ClearLogs_Sep22_1
1.12
43
SUSP_CryptBase_PE_Info_NOT_Cryptbase_Feb23
1.19
21
SUSP_OBFUSC_PY_Loader_Jun23_1
1.48
21
SUSP_Webshell_OBFUSC_Indicators_Aug22_1
2.07
14
SUSP_URL_Split_Jun23
2.5
18
SUSP_OBFUSC_JS_Atob_Anomalies_Feb23
2.69
13
PUA_RuskDesk_Remote_Desktop_Jun23_1
2.78
18
SUSP_JS_Redirector_Mar23
2.81
108
SUSP_JS_Executing_Powershell_Apr23
3.14
274
SUSP_PY_Reverse_Shell_Indicators_Jan23_1
3.25
16
SUSP_OBFUSC_JS_Execute_Base64_Mar23
3.26
34
SUSP_Encoded_Registry_Key_Paths_Sep22_1
3.39
64
SUSP_PE_OK_RU_URL_Jun23
3.59
17
HKTL_Clash_Tunneling_Tool_Aug22_2
3.75
16
SUSP_PY_OBFUSC_Hyperion_Aug22_1
4.0
13
SUSP_BAT_OBFUSC_Apr23_1
4.0
16
SUSP_RANSOM_Note_Aug22
4.01
171
SUSP_OBFUSC_JS_Atob_Anomalies_Feb23_2
4.52
67
SUSP_BAT_PS1_Contents_Jan23_1
5.11
18
SUSP_OBFUSC_PS1_FormatStrings_Dec22_1
5.33
12
SUSP_BAT_OBFUSC_Apr23_4
5.35
26
SUSP_OBFUSC_BAT_Dec22_1
5.84
31

Latest YARA Matches with Low AV Detection Rate

This table lists the last matches with low AV detection rates (between 0 and 15 AV engines matched)

Rule
AVs
Hash
VT
MAL_MacroDropper_Jan18_1
12
14480708c61effe16936d3485bbc09c9ddaace2f2532aadf4e5e14991272fc0f
MAL_LNX_Mirai_Mar23_1
12
e13ad9d0efe2fc524189b97a14f6a6e418f319f5b697a4332d94ddf9e7bd4ded
MAL_ARM_LNX_Mirai_Mar13_2022
12
e13ad9d0efe2fc524189b97a14f6a6e418f319f5b697a4332d94ddf9e7bd4ded
MAL_LNX_Mirai_Mar23_1
10
e1bcc4d96ceb8f75bdd283520fc1c4de75b3a21b045e7143f8ec6091dda55737
MAL_LNX_Mirai_Dec22_1
10
e1bcc4d96ceb8f75bdd283520fc1c4de75b3a21b045e7143f8ec6091dda55737
SUSP_Encoded_EnvUserProfile
14
4429b4a02ad215c419675f23743c970cac2ac6633f3f421f830e30a9dc7d663a
MAL_MacOS_Amos_Stealer_Jun25
14
0088ddae3f7b83697641947d6d64c5afecff957df147d79c5e13b769bb31ad40
MAL_MacOS_Amos_Stealer_Jun25
10
a8fc923f0374778473cdb6cf3512b5b10d7e18c43505ddae28bd686f504e4d78
MAL_MacOS_Amos_Stealer_Jun25
12
3efa25d32a9ae494836bcb281f162ebb61c1d8872686bc94dcfaea646f4c224e
SUSP_Encoded_EnvUserProfile
5
6a9e07977472a734c3689e5dc6b71344b6548a3a1391d23f4a649e405dd69b18
MAL_JAR_Attachments_Dec21_1
9
8349b5069574be8d88490f2edc881130c545d00b278c1ea9c6ffe869eaad14ba
HKTL_PS1_Base64_Encoded_Shell_Indicators_Feb22_1
1
cb1bd453b86c33b362f82ef1bd19370eb366e022a2911ec3bd1be5b0a3e62c9f
SUSP_HKTL_PS1_Loader_May23_3
12
16de8c96af5c660f6542469c7125a604987fe2e18c17e9e4a085f3f11e933c48
SUSP_Encoded_EnvUserProfile
14
36113cd1dd1b9cc7bf948bacca9b83c05de7fb482be50d298c31146986550275
SUSP_Encoded_PS_DownloadFile
8
4316f1149b06ba2aa4d9fd74af7c778a0968d5cc08cf05372e657c3c7e141967
SUSP_VBS_Loader_Oct24_1
5
a1aedbe0a1470afcbd58d5785699663bddc2a1a65d20049580d924f7a49367c7
MAL_BAT_OBFUSC_BOM_Override_Apr25
11
ec69483a59ab4d9f4ffe025d4a48a027fcafd4cc7c5c12463a7c1305413e0fe4
HKTL_AntiAV_Indicators_Jul21_1
11
ec69483a59ab4d9f4ffe025d4a48a027fcafd4cc7c5c12463a7c1305413e0fe4
EXPL_Office_TemplateInjection_Aug19
4
fcdba6b998a3bfbfb280fac5a487bdb596cd92901468236b9d9d296ecbc54df8
SUSP_LNX_Base64_Encoded_Webshell_Mar22
1
21bf9f11d32a0dddfcd6b32193267810c5ad3d6f30b2ad27d985f82251abdf3c

YARA Rules Per Category

This list shows the number of YARA rules in the subscribable categories (categories overlap as a rule can be in 'n' categories)

Tag
Count
Malware
7041
Threat Hunting (not subscribable, only in THOR scanner)
5514
APT
5008
Hacktools
4727
Webshells
2388
Exploits
683

Newest Sigma Rules

This table shows the newest additions to the Sigma rule set

Rule
Description
Date
Ref
Info
Windows MFA Tool Uninstallation via WMI
Detects the uninstallation of the Windows Multi-Factor Authentication (MFA) tool such as Duo Authentication for Windows Logon through Windows Management Instrumentation (WMI). These MFA tools are used to enhance security by requiring additional verification during the login process. Thus, threat actors may attempt to uninstall these tools to bypass mfa.
01.08.2025
Password Set to Never Expire via WMI
Detects the use of wmic.exe to modify user account settings and explicitly disable password expiration.
30.07.2025
SharePoint CVE-2025-53770 ToolShell Exploitation Commandline
Detects potential SharePoint exploitation (CVE-2025-53770) using ToolShell. This rule looks for suspicious command lines that may indicate the use of ToolShell to exploit SharePoint vulnerabilities. The detection is based on known patterns of exploitation, such as the presence of specific paths and commands related to SharePoint installations.
24.07.2025
Suspicious File Write to SharePoint Layouts Directory
Detects suspicious file writes to SharePoint layouts directory which could indicate webshell activity or post-exploitation. This behavior has been observed in the exploitation of SharePoint vulnerabilities such as CVE-2025-49704, CVE-2025-49706 or CVE-2025-53770.
24.07.2025
Suspicious File Created in Outlook Temporary Directory
Detects the creation of files with suspicious file extensions in the temporary directory that Outlook uses when opening attachments. This can be used to detect spear-phishing campaigns that use suspicious files as attachments, which may contain malicious code.
22.07.2025
Potential SharePoint ToolShell CVE-2025-53770 Exploitation - File Create
Detects the creation of file such as spinstall0.aspx which may indicate successful exploitation of CVE-2025-53770. CVE-2025-53770 is a zero-day vulnerability in SharePoint that allows remote code execution.
21.07.2025
SharePoint ToolShell CVE-2025-53770 Exploitation - Web IIS
Detects access to vulnerable SharePoint components potentially being exploited in CVE-2025-53770 through IIS web server logs. CVE-2025-53770 is a zero-day vulnerability in SharePoint that allows remote code execution.
21.07.2025
Potential SharePoint ToolShell CVE-2025-53770 Exploitation Indicators
Detects potential exploitation of CVE-2025-53770 by identifying indicators such as suspicious command lines discovered in Post-Exploitation activities. CVE-2025-53770 is a zero-day vulnerability in SharePoint that allows remote code execution.
21.07.2025
Potential SSH Tunnel Persistence Install Using A Scheduled Task
Detects the creation of new scheduled tasks via commandline, using Schtasks.exe. This rule detects tasks creating that call OpenSSH, which may indicate the creation of reverse SSH tunnel to the attacker's server.
14.07.2025
Delete Defender Scan ShellEx Context Menu Registry Key
Detects deletion of registry key that adds 'Scan with Defender' option in context menu. Attackers may use this to make it harder for users to scan files that are suspicious.
11.07.2025
Windows Defender Threat Severity Default Action Modified
Detects modifications or creations of Windows Defender's default threat action settings based on severity to 'allow' or take 'no action'. This is a highly suspicious configuration change that effectively disables Defender's ability to automatically mitigate threats of a certain severity level, allowing malicious software to run unimpeded. An attacker might use this technique to bypass defenses before executing payloads.
11.07.2025
PowerShell Defender Threat Severity Default Action Set to 'Allow' or 'NoAction'
Detects the use of PowerShell to execute the 'Set-MpPreference' cmdlet to configure Windows Defender's threat severity default action to 'Allow' (value '6') or 'NoAction' (value '9'). This is a highly suspicious configuration change that effectively disables Defender's ability to automatically mitigate threats of a certain severity level. An attacker might use this technique via the command line to bypass defenses before executing payloads.
11.07.2025
ADExplorer Writing Complete AD Snapshot Into .dat File
Detects the dual use tool ADExplorer writing a complete AD snapshot into a .dat file. This can be used by attackers to extract data for Bloodhound, usernames for password spraying or use the meta data for social engineering. The snapshot doesn't contain password hashes but there have been cases, where administrators put passwords in the comment field.
09.07.2025
Failed Logon from Known Bad Hostname
Detects failed RDP logon attempts or accessing of a network share from a system using a known bad hostname. This hostname is probably part of a golden image attackers use for their attacks.
09.07.2025
Windows Defender Context Menu Removed
Detects the use of reg.exe or PowerShell to delete the Windows Defender context menu handler registry keys. This action removes the "Scan with Microsoft Defender" option from the right-click menu for files, directories, and drives. Attackers may use this technique to hinder manual, on-demand scans and reduce the visibility of the security product.
09.07.2025
Logon from Known Bad Hostname
Detects a successful RDP logon or accessing of a network share from a system using a known bad hostname. This hostname is probably part of a golden image attackers use for their attacks.
09.07.2025
Disabling Windows Defender WMI Autologger Session via Reg.exe
Detects the use of reg.exe to disable the Event Tracing for Windows (ETW) Autologger session for Windows Defender API and Audit events. By setting the 'Start' value to '0' for the 'DefenderApiLogger' or 'DefenderAuditLogger' session, an attacker can prevent these critical security events from being logged, effectively blinding monitoring tools that rely on this data. This is a powerful defense evasion technique.
09.07.2025
FileFix - Command Evidence in TypedPaths from Browser File Upload Abuse
Detects commonly-used chained commands and strings in the most recent 'url' value of the 'TypedPaths' key, which could be indicative of a user being targeted by the FileFix technique.
05.07.2025
HackTool - Doppelanger LSASS Dumper Execution
Detects the execution of the Doppelanger hacktool which is used to dump LSASS memory via process cloning while evading common detection methods
01.07.2025
HackTool - HollowReaper Execution
Detects usage of HollowReaper, a process hollowing shellcode launcher used for stealth payload execution through process hollowing. It replaces the memory of a legitimate process with custom shellcode, allowing the attacker to execute payloads under the guise of trusted binaries.
01.07.2025
FileFix - Suspicious Child Process from Browser File Upload Abuse
Detects potentially suspicious subprocesses such as LOLBINs spawned by web browsers. This activity could be associated with the "FileFix" social engineering technique, where users are tricked into launching the file explorer via a browser-based phishing page and pasting malicious commands into the address bar. The technique abuses clipboard manipulation and disguises command execution as benign file path access, resulting in covert execution of system utilities.
26.06.2025
Potential Notepad++ CVE-2025-49144 Exploitation
Detects potential exploitation of CVE-2025-49144, a local privilege escalation vulnerability in Notepad++ installers (v8.8.1 and prior) where the installer calls regsvr32.exe without specifying the full path. This allows an attacker to execute arbitrary code with elevated privileges by placing a malicious regsvr32.exe alongside this Legitimate Notepad++ installer. The vulnerability is triggered when the installer attempts to register the NppShell.dll file, which is a component of Notepad++.
26.06.2025
Suspicious DNS Query Indicating Kerberos Coercion via DNS Object SPN Spoofing
Detects DNS queries containing patterns associated with Kerberos coercion attacks via DNS object spoofing. The pattern "1UWhRCAAAAA..BAAAA" is a base64-encoded signature that corresponds to a marshaled CREDENTIAL_TARGET_INFORMATION structure. Attackers can use this technique to coerce authentication from victim systems to attacker-controlled hosts. It is one of the strong indicators of a Kerberos coercion attack, where adversaries manipulate DNS records to spoof Service Principal Names (SPNs) and redirect authentication requests like CVE-2025-33073.
20.06.2025
Potential Kerberos Coercion by Spoofing SPNs via DNS Manipulation
Detects modifications to DNS records in Active Directory where the Distinguished Name (DN) contains a base64-encoded blob matching the pattern "1UWhRCAAAAA...BAAAA". This pattern corresponds to a marshaled CREDENTIAL_TARGET_INFORMATION structure, commonly used in Kerberos coercion attacks. Adversaries may exploit this to coerce victim systems into authenticating to attacker-controlled hosts by spoofing SPNs via DNS. It is one of the strong indicators of a Kerberos coercion attack,. where adversaries manipulate DNS records to spoof Service Principal Names (SPNs) and redirect authentication requests like CVE-2025-33073. Please investigate the user account that made the changes, as it is likely a low-privileged account that has been compromised.
20.06.2025
Suspicious DNS Query Indicating Kerberos Coercion via DNS Object SPN Spoofing - Network
Detects DNS queries containing patterns associated with Kerberos coercion attacks via DNS object spoofing. The pattern "1UWhRCAAAAA..BAAAA" is a base64-encoded signature that corresponds to a marshaled CREDENTIAL_TARGET_INFORMATION structure. Attackers can use this technique to coerce authentication from victim systems to attacker-controlled hosts. It is one of the strong indicators of a Kerberos coercion attack, where adversaries manipulate DNS records to spoof Service Principal Names (SPNs) and redirect authentication requests like CVE-2025-33073.
20.06.2025
Attempts of Kerberos Coercion Via DNS SPN Spoofing
Detects the presence of "UWhRC....AAYBAAAA" pattern in command line. The pattern "1UWhRCAAAAA..BAAAA" is a base64-encoded signature that corresponds to a marshaled CREDENTIAL_TARGET_INFORMATION structure. Attackers can use this technique to coerce authentication from victim systems to attacker-controlled hosts. It is one of the strong indicators of a Kerberos coercion attack, where adversaries manipulate DNS records to spoof Service Principal Names (SPNs) and redirect authentication requests like in CVE-2025-33073. If you see this pattern in the command line, it is likely an attempt to add spoofed Service Principal Names (SPNs) to DNS records, or checking for the presence of such records through the `nslookup` command.
20.06.2025
Suspicious Conhost Remote Share Execution
Detects suspicious conhost.exe execution with a remote share path, which may indicate an attempt to execute code from a remote location. Threat actors may use this technique to execute malicious payloads hosted on remote shares, often leveraging the conhost process for proxy execution of commands or scripts while evading detection. This is commonly seen in the lnk file execution, that was send via phishing emails or other means, which aim is to get initial hold on the target system and execute secondary payloads from remote shares.
19.06.2025
Suspicious Command Execution from Remote Share
Detects execution of potential malicious files from remote shares using command prompt, which may indicate an attempt to execute code from a remote location. Threat actors may use this technique to execute malicious payloads hosted on remote shares. This is commonly seen in the malicious lnk file execution, that was sent via phishing emails or other means, which aim is to get initial hold on the target system and execute secondary payloads from remote shares.
19.06.2025
SystemRoot Environment Variable Hijacking
Detects potential environment variable hijacking of `SystemRoot` or `windir` variables. Adversaries may execute their own malicious payloads by hijacking environment variables used to load libraries.
17.06.2025
Potential Service Environment Variable Tampering
Detects modifications to service environment variables in the Windows registry that could indicate an attempt to tamper with system environment variables. This technique is often used for privilege escalation or persistence by modifying the `SystemRoot` or `windir` variables to point to malicious locations.
17.06.2025

YARA/SIGMA Rule Count

Rule Type
Community Feed
Nextron Private Feed
Yara
2692
20153
Sigma
3420
797

Sigma Rules Per Category (Community)

Type
Count
windows / process_creation
1279
windows / registry_set
203
windows / file_event
199
windows / ps_script
165
windows / security
158
linux / process_creation
120
windows / image_load
110
webserver
82
windows / system
73
macos / process_creation
67
linux / auditd
53
windows / network_connection
52
proxy
52
aws / cloudtrail
46
azure / activitylogs
43
windows / registry_event
39
azure / auditlogs
38
windows / ps_module
33
windows / application
30
windows / dns_query
25
azure / signinlogs
24
windows / process_access
23
okta / okta
22
azure / riskdetection
19
windows / pipe_created
18
opencanary / application
18
linux
17
rpc_firewall / application
17
windows / windefend
16
gcp / gcp.audit
16
bitbucket / audit
14
m365 / threat_management
13
windows / file_delete
13
github / audit
13
cisco / aaa
12
windows / create_remote_thread
12
windows / codeintegrity-operational
10
kubernetes / application / audit
10
windows / driver_load
10
windows / ps_classic_start
9
windows / create_stream_hash
9
dns
9
windows / registry_add
9
linux / file_event
9
windows / firewall-as
8
windows / msexchange-management
8
windows / registry_delete
8
zeek / smb_files
7
antivirus
7
azure / pim
7
windows / appxdeployment-server
7
windows / file_access
7
gcp / google_workspace.admin
7
windows / bits-client
7
windows / dns-client
6
zeek / http
5
linux / network_connection
5
jvm / application
5
kubernetes / audit
5
zeek / dns
5
windows / sysmon
4
windows / taskscheduler
4
windows / iis-configuration
4
zeek / dce_rpc
4
m365 / audit
3
windows / wmi_event
3
windows / powershell-classic
3
windows / ntlm
3
linux / sshd
3
linux / syslog
2
windows / dns-server
2
onelogin / onelogin.events
2
macos / file_event
2
apache
2
qualys
2
windows / security-mitigations
2
windows / file_change
2
spring / application
2
firewall
2
velocity / application
1
windows / certificateservicesclient-lifecycle-system
1
windows / microsoft-servicebus-client
1
ruby_on_rails / application
1
m365 / exchange
1
linux / sudo
1
zeek / x509
1
windows / file_executable_detected
1
sql / application
1
linux / vsftpd
1
windows / diagnosis-scripted
1
windows / smbclient-security
1
windows / file_rename
1
windows / sysmon_status
1
m365 / threat_detection
1
zeek / rdp
1
windows / sysmon_error
1
zeek / kerberos
1
windows / terminalservices-localsessionmanager
1
database
1
windows / dns-server-analytic
1
windows / driver-framework
1
windows
1
windows / printservice-admin
1
nginx
1
windows / ps_classic_provider_start
1
windows / printservice-operational
1
netflow
1
cisco / ldp
1
windows / wmi
1
fortios / sslvpnd
1
linux / auth
1
cisco / bgp
1
windows / lsa-server
1
django / application
1
cisco / syslog
1
linux / cron
1
nodejs / application
1
windows / smbclient-connectivity
1
linux / guacamole
1
huawei / bgp
1
windows / appmodel-runtime
1
windows / ldap
1
windows / process_tampering
1
paloalto / file_event / globalprotect
1
cisco / duo
1
linux / clamav
1
juniper / bgp
1
windows / applocker
1
windows / openssh
1
python / application
1
paloalto / appliance / globalprotect
1
windows / appxpackaging-om
1
windows / raw_access_thread
1
windows / capi2
1
windows / shell-core
1

Sigma Rules Per Category (Nextron Private Feed)

Type
Count
windows / process_creation
373
windows / registry_set
75
windows / ps_script
73
windows / image_load
42
windows / file_event
38
linux / process_creation
33
windows / wmi
29
windows / security
22
proxy
12
windows / system
9
windows / network_connection
8
windows / registry_event
8
windows / kernel-event-tracing
6
windows / ntfs
5
windows / ps_module
5
windows / pipe_created
4
windows / sense
4
windows / taskscheduler
4
windows / create_remote_thread
4
windows / registry_delete
4
windows / hyper-v-worker
3
windows / ps_classic_script
3
windows / vhd
3
webserver
3
windows / application-experience
3
windows / driver_load
3
windows / kernel-shimengine
2
windows / windefend
2
windows / process_access
2
windows / bits-client
2
windows / codeintegrity-operational
2
windows / file_access
1
linux / file_event
1
windows / dns_query
1
windows / firewall-as
1
windows / file_rename
1
windows / amsi
1
windows / file_delete
1
macos / process_creation
1
windows / audit-cve
1
windows / application
1
windows / registry-setinformation
1

Tenable Nessus

Requirement: Privileged Scan

  • YARA Scanning with Nessus works only when scanning with credentials (privileged scan)
Tutorial: https://docs.tenable.com/nessus/Content/CredentialedChecksOnWindows.htm

YARA Scanning with Nessus

  • You can only upload a single .yar file
  • Filesystem scan has to be activated
  • You have to define the target locations
  • The Nessus plugin ID will be 91990
  • Only files with the following extensions can be scanned: .application, .asp, .aspx, .bat, .chm, .class, .cmd, .com, .cp, .csh, .dl, .doc, .docx, .drv, .exe, .gadget, .hta, .inf, .ins, .inx, .isu, .jar, .job, .jpeg, .jpg, .js, .jse, .jse, .jsp, .lnk, .msc, .msi, .msp, .mst, .paf, .pdf, .php, .pif, .ppt, .pptx, .ps1, .ps1xm, .ps2, .ps2xm, .psc1, .psc2, .reg, .rgs, .scf, .scr, .sct, .shb, .shs, .swf, .sys, .u3p, .vb, .vbe, .vbs, .vbscript, .ws, .wsf, .xls, .xls
Tutorial: https://de.tenable.com/blog/threat-hunting-with-yara-and-nessus

Carbon Black

Tutorial: https://github.com/carbonblack/cb-yara-connector

FireEye EX

Tutorial: https://www.fireeye.com/blog/products-and-services/2018/12/detect-and-block-email-threats-with-custom-yara-rules.html