Valhalla Logo
currently serving 23560 YARA rules and 4365 Sigma rules
API Key

New Rules per Day

Newest YARA Rules

This table shows the newest additions to the YARA rule set

Rule
Description
Date
Ref
MAL_POC_Microsoft_Warbird_Loader_Feb26
Detects a POC to turn Microsoft Warbird into a shellcode loader
03.02.2026
MAL_Chrysalis_DllLoader_Feb26
Detects DLL used to load Chrysalis backdoor, seen being used in the compromise of the infrastructure hosting Notepad++ by Chinese APT group Lotus Blossom
02.02.2026
MAL_Chrysalis_Shellcode_Loader_Feb26
Detects shellcode used to load Chrysalis backdoor, seen being used in the compromise of the infrastructure hosting Notepad++ by Chinese APT group Lotus Blossom
02.02.2026
MAL_Chrysalis_Backdoor_Feb26
Detects Chrysalis backdoor, seen being used in the compromise of the infrastructure hosting Notepad++ by Chinese APT group Lotus Blossom
02.02.2026
MAL_CobaltStrike_Beacon_Loader_Feb26
Detects Cobalt Strike beacon loader
02.02.2026
MAL_RANSOM_Green_Blood_Jan26
Detects Green Blood ransomware
30.01.2026
SUSP_Claude_Refusal_Magic_String_Jan26
Detects refusal magic string that cause Claude sessions to be terminated. This might indicate that a file tries to prevent being analyzed by LLM agents.
29.01.2026
MAL_Claude_Refusal_Magic_String_Jan26
Detects Base64 variations of refusal magic string that cause Claude sessions to be terminated. This might indicate that a file tries to prevent being analyzed by LLM agents.
29.01.2026
SUSP_Claude_Redacted_Thinking_Magic_String_Jan26_1
Detects redacted thinking magic string that cause Claude sessions to be terminated. This might indicate that a file tries to prevent being analyzed by LLM agents.
29.01.2026
SUSP_Claude_Redacted_Thinking_Magic_String_Jan26_2
Detects Base64 variations of redacted thinking magic string that cause Claude sessions to be terminated. This might indicate that a file tries to prevent being analyzed by LLM agents.
29.01.2026
HKTL_SAMDump_Jan26
Detects SAMDump tool that extracts Windows SAM/SYSTEM files via Volume Shadow Copy Service (VSS) using NT API calls with XOR obfuscation and local/network exfiltration capabilities
28.01.2026
MAL_KazakRAT_Jan26
Detects KazakRAT that used to execute as a DLL via rundll32, maintain persistence through Run keys, and poll an HTTP C2 for commands
26.01.2026
MAL_Loader_Jan26_3
Detects a loader that establishes persistence and executes a hidden DLL
26.01.2026
MAL_Loader_Jan26_2
Detects a loader seen being used by multiple malware families
25.01.2026
MAL_JS_DPRK_Backdoor_Jan26
Detects JavaScript backdoor functionality used by threat actor group DPRK
23.01.2026
MAL_JS_DPRK_Second_Stage_Jan26
Detects second-stage JavaScript payload used by threat actor group DPRK
23.01.2026
MAL_Loader_Jan26_1
Detects a loader seen being use to load Winos4.0 (WinosStager) which is a sophisticated remote access framework
22.01.2026
PUA_VULN_Driver_Tobaz_Jan26
Detects vulnerable Tobaz driver abused by malwares to terminate security products and evade detection
21.01.2026
SUSP_Kernel_Module_Jan26
Detects suspicious Linux kernel modules that may exhibit rootkit-like behavior.
21.01.2026
MAL_Covert_RAT_Jan26
Detects Covert RAT that enables unauthorized remote control of infected systems. Operates covertly to evade detection while providing attackers with capabilities for surveillance, data exfiltration, command execution, and persistent backdoor access.
21.01.2026
SUSP_BATCH_Downloader_Jan26
Detects suspicious batch files with PowerShell download capabilities
21.01.2026
MAL_FALSECUB_Implant_Jan26
Detects FALSECUB backdoor implant used in Operation Nomad Leopard via unique HTTP header and socket-related code patterns
21.01.2026
MAL_Clr_Loader_Jan26
Detects generic loader stub observed to drop various malware like Pulsar, Vidar etc.
20.01.2026
MAL_PYC_Moneta_Stealer_Jan26
Detects Moneta stealer written in Python that targets browser credentials, cryptocurrency wallets, SSH keys, and financial documents
20.01.2026
MAL_CurlBack_RAT_Jan26
Detects CurlBack RAT that utilizes DLL side-loading, registers victims via UUID, and supports file transfer using curl, seen being used by APT36 APT group
20.01.2026
HKTL_GoTokenTheft_Jan26
Detects GoTokenTheft, a token-stealing tool written in Go, used during post-exploitation to run programs and commands on a target machine under different user privileges.
19.01.2026
MAL_Shellcode_Loader_Jan26
Detects a shellcode loader used to execute shellcode in memory, often employed by malware for code injection and evasion
18.01.2026
MAL_Shellcode_Jan26
Detects a shellcode that used load and execute payloads
18.01.2026
SUSP_JS_NPM_PM2_PostInstallScript_Jan26
Detects package.json which launches a post install script via Process Manager 2
16.01.2026
SUSP_JS_PostInstallScript_Jan26
Detects post install script which installs NPM package via Process Manager 2
16.01.2026

Successful YARA Rules in Set

This table shows statistics of the best rules with lowest AV detection rates (rules created in the last 12 months, matches of the last 14 days)

Rule
Average AV Detection Rate
Sample Count
Info
VT
MAL_GuLoader_Shellcode_Oct22_3
0.0
20
SUSP_MAL_EXFIL_Stealer_Output_Characteristics_Sep22_1
0.04
180
SUSP_PY_OBFUSC_Berserker_Indicators_Dec22_1
0.21
14
SUSP_BAT_OBFUSC_Apr23_2
0.59
64
SUSP_Encrypted_ZIP_Suspicious_Contents_Jul23_1_File
0.64
11
SUSP_PUA_RustDesk_Apr23_1
0.68
22
SUSP_BAT_PS1_Combo_Jan23_2
0.71
45
SUSP_JS_OBFUSC_Feb23_2
1.04
1736
SUSP_WEvtUtil_ClearLogs_Sep22_1
1.12
43
SUSP_CryptBase_PE_Info_NOT_Cryptbase_Feb23
1.19
21
SUSP_OBFUSC_PY_Loader_Jun23_1
1.48
21
SUSP_Webshell_OBFUSC_Indicators_Aug22_1
2.07
14
SUSP_URL_Split_Jun23
2.5
18
SUSP_OBFUSC_JS_Atob_Anomalies_Feb23
2.69
13
PUA_RuskDesk_Remote_Desktop_Jun23_1
2.78
18
SUSP_JS_Redirector_Mar23
2.81
108
SUSP_JS_Executing_Powershell_Apr23
3.14
274
SUSP_PY_Reverse_Shell_Indicators_Jan23_1
3.25
16
SUSP_OBFUSC_JS_Execute_Base64_Mar23
3.26
34
SUSP_Encoded_Registry_Key_Paths_Sep22_1
3.39
64
SUSP_PE_OK_RU_URL_Jun23
3.59
17
HKTL_Clash_Tunneling_Tool_Aug22_2
3.75
16
SUSP_PY_OBFUSC_Hyperion_Aug22_1
4.0
13
SUSP_BAT_OBFUSC_Apr23_1
4.0
16
SUSP_RANSOM_Note_Aug22
4.01
171
SUSP_OBFUSC_JS_Atob_Anomalies_Feb23_2
4.52
67
SUSP_BAT_PS1_Contents_Jan23_1
5.11
18
SUSP_OBFUSC_PS1_FormatStrings_Dec22_1
5.33
12
SUSP_BAT_OBFUSC_Apr23_4
5.35
26
SUSP_OBFUSC_BAT_Dec22_1
5.84
31

Latest YARA Matches with Low AV Detection Rate

This table lists the last matches with low AV detection rates (between 0 and 15 AV engines matched)

Rule
AVs
Hash
VT
Generic_Strings_Hacktools
3
ce766d9ae26701b0620932f72aa5ffb3ae9534b26b47f20503adc6e879b754c4
PUA_ConnectWise_ScreenConnect_Mar23
5
cb9a6e6604bcbaad30ab4cdaa39bbcb66967a93a0f782e23a95dbc662cfa1ec1
SUSP_OBFUSC_Base64_Hex_Encoded_Apr19
7
449e7033930522d70ac9fa7c61f7d105f0d799da7d140ac9310b9d105fe431c4
SUSP_OBFUSC_Base64_Hex_Encoded_Apr19
13
0318163219e6fd48ccf433ef0bac4c5d5a39b429e05f8a23ccc4d00a01e22e2b
SUSP_OBFUSC_Base64_Hex_Encoded_Apr19
13
e021628d6ff4a6592081e78ea18462edcf14e248391cc9bdc9847ea54c234c93
SUSP_OBFUSC_Base64_Hex_Encoded_Apr19
13
28af9993479d8a173ae2d3a0434d3484d67805f33750d53b2423ef24ce17597a
SUSP_OBFUSC_Base64_Hex_Encoded_Apr19
13
5c95b7645e8365e3b7eba207edf6ac80ffd41203b2b25a2d0aaada54ecd8671b
SUSP_OBFUSC_Base64_Hex_Encoded_Apr19
12
13c3a3433eeb4d130110383e6473fab2dacc5b83a7decb020b0f1ee041ccb013
SUSP_PyInstaller_Gen_Pattern_Feb25
11
9ea321617545556e294e77f26dd6e31fc3e62434efbe1460b082f2b57bc17eab
SUSP_Credential_Stealer_Indicators_Jul23_1
10
a612c54277f072af50db7e2b036002b9118393a51f43042438d7ae340e7e1a0a
SUSP_Credential_Stealer_Api_Indicators_Aug24
10
a612c54277f072af50db7e2b036002b9118393a51f43042438d7ae340e7e1a0a
SUSP_PE_IP_Info_Combo_Aug24
10
a612c54277f072af50db7e2b036002b9118393a51f43042438d7ae340e7e1a0a
SUSP_B64_Atob_Aug23
7
b85a70d74ad5984a1bdf726547a856ab0e418845d3a5740cd5f09916d053a924
SUSP_OBFUSC_Base64_Hex_Encoded_Apr19
7
b85a70d74ad5984a1bdf726547a856ab0e418845d3a5740cd5f09916d053a924
SUSP_Encoded_OnErrorResumeNext_Jun23
6
6ee0a0392781e3265f0c70cb59992073da709a763177284adb630c8c8e7c346a
MAL_GamaWiper_Loader_Dec25
6
6ee0a0392781e3265f0c70cb59992073da709a763177284adb630c8c8e7c346a
SUSP_OBFUSC_Casing_Anomaly_Msiexec_Exe
11
556936854a1c8831b7988de3e2779f9766491dd2372e7cb225df276c4867599b
SUSP_PyInstaller_Gen_Pattern_Feb25
2
be01fa596c3e4c5f035238f5f45ec923964fc9c95c5c25c5fd6b7627fc0eeb87
EXPL_RCE_React_Server_CVE_2025_55182_POC_Dec25
2
f7b3b4007054f3b42bb2219ab22adb5431b747e0c333cc0a029965eaeabf5b35
SUSP_Protector_Themida_Packed_Samples_Mar21_1
5
a4e93af7e6cf52100b8ee83c1a3af2084a0317bf4578fd7ba80f8f016bd94c94

YARA Rules Per Category

This list shows the number of YARA rules in the subscribable categories (categories overlap as a rule can be in 'n' categories)

Tag
Count
Malware
7413
Threat Hunting (not subscribable, only in THOR scanner)
5761
APT
5042
Hacktools
4803
Webshells
2397
Exploits
713

Newest Sigma Rules

This table shows the newest additions to the Sigma rule set

Rule
Description
Date
Ref
Info
Renamed TinyCC (TCC) Compiler Execution
Detects the execution of a renamed TinyCC (TCC) Compiler (tcc.exe) Attackers have been observed renaming tcc.exe to masquerade as legitimate Windows binaries (e.g., svchost.exe) to compile and execute malicious C code in memory, such as shellcode loaders. This technique was observed in Chrysalis backdoor attacks.
03.02.2026
Tiny C Compiler Runtime Execution
Detects execution of Tiny C Compiler (TCC) which compiles and executes C code directly in memory. This technique was observed in Chrysalis backdoor campaigns where attackers renamed tcc.exe to svchost.exe and used it to load shellcode from .c files directly into memory, bypassing traditional detection methods.
03.02.2026
Suspicious Modification of Service ImagePath for ClipUp Defender Evasion
Detects registry modifications that set the ImagePath of a service to execute ClipUp.exe with Protected Process Light (PPL) parameters targeting Windows Defender locations. This technique is used by attackers to replace the Windows Defender service executable before it initializes, effectively bypassing security protections. The approach leverages CreateProcessAsPPL.exe to obtain PPL privileges, which normally protect security software from tampering.
29.01.2026
Windows Defender Critical Binary Deletion
Detects the deletion of critical Windows Defender binaries which could indicate an attempt to disable or manipulate Windows Defender.
29.01.2026
Suspicious File Creation by Clipup in Windows Defender Directory
Detects file creation by Clipup.exe in the Windows Defender program files directory. ClipUp.exe may be used to overwrite the service executable of Windows Defender, potentially allowing an attacker to disable or manipulate Windows Defender.
29.01.2026
Suspicious ClipUp Execution with Windows Defender Path
Detects suspicious execution of ClipUp.exe with parameters that may indicate an attempt to write to Windows Defender protected locations. ClipUp.exe may be used to overwrite the service executable of Windows Defender, potentially allowing an attacker to disable or manipulate Windows Defender.
29.01.2026
Windows Defender Folder Invocation Through Short Name
Detects suspicious command line patterns where a process is invoking a path within the Windows Defender folder using its short name (8.3 notation). This technique may be used to execute or manipulate Windows Defender binaries while evading detection mechanisms that do not account for short path names.
29.01.2026
File Sync to NTUSER.MAN on Roaming Profile Shares
Detects file synchronization events involving 'NTUSER.MAN' files on roaming profile shares. NTUSER.MAN is a mandatory user profile file that takes priority over NTUSER.DAT when present in a user's profile directory. Adversaries may abuse this feature for registry persistence by placing a crafted NTUSER.MAN file containing malicious registry keys. This technique also don't produce registry telemetry as the hive is loaded directly from disk without invoking registry APIs or triggering CmRegisterCallbackEx callbacks. Mandatory profiles are rare in modern environments outside of kiosk or shared workstation configurations, making their presence suspicious. Consider excluding specific admin tools or scripts if this is common in your environment.
21.01.2026
Creation of NTUSER.MAN File in User Profile
Detects the creation of an NTUSER.MAN file in a user's profile directory. NTUSER.MAN is a mandatory user profile file that takes priority over NTUSER.DAT when present in a user's profile directory. Adversaries may abuse this feature for registry persistence by placing a crafted NTUSER.MAN file containing malicious registry keys. This technique also don't produce registry telemetry as the hive is loaded directly from disk without invoking registry APIs or triggering CmRegisterCallbackEx callbacks. Mandatory profiles are rare in modern environments outside of kiosk or shared workstation configurations, making their presence suspicious.
21.01.2026
AD User ProfilePath Attribute Modification
Detects changes to the 'ProfilePath' attribute of an Active Directory user account. Attackers can modify this attribute to point to a roaming profile to establish persistence or lateral movement within a network. One of the example includes updating the profilepath to network share to sync malicious NTUSER.MAN files for registry persistence. Since, this event can be generated during legitimate administrative activities, it is recommended to validate the legitimacy of such changes by cross-referencing with change management logs or known administrative actions.
21.01.2026
Usage of NTUSER.MAN in Command Line
Detects the string 'NTUSER.MAN' in a command line, which may indicate attempts to manipulate or utilize mandatory user profile files. NTUSER.MAN is a mandatory user profile file that takes priority over NTUSER.DAT when present in a user's profile directory. Adversaries may abuse this feature for registry persistence by placing a crafted NTUSER.MAN file containing malicious registry keys. This technique also don't produce registry telemetry as the hive is loaded directly from disk without invoking registry APIs or triggering CmRegisterCallbackEx callbacks. Mandatory profiles are rare in modern environments outside of kiosk or shared workstation configurations, making their presence suspicious.
21.01.2026
NTUSER.MAN Creation From Process In Suspicious Location
Detects the creation of an NTUSER.MAN file from process in suspicious location
20.01.2026
NTUSER.MAN Creation By Uncommon Processes
Detects the creation of an NTUSER.MAN file by Uncommon processes
20.01.2026
Suspicious NTUSER.MAN Creation by Uncommon Process
Detects creation of NTUSER.MAN (mandatory profile hive) by uncommon processes.
20.01.2026
Hacktool - Kernel Driver Utility Execution
Detects execution of the Kernel Driver Utility (KDU) tool. KDU can be used to bypass driver signature enforcement and load unsigned or malicious drivers into the Windows kernel.
12.01.2026
Windows Firewall Global Outbound Block Via Netsh.EXE
Detects use of netsh advfirewall to add firewall rules that block all remote IP addresses (0.0.0.0-255.255.255.255), a technique commonly used for defense evasion to isolate a system or suppress network-based security controls.
12.01.2026
Data Exfiltration via Curl to Messaging Platforms
Detects curl commands with POST data targeting messaging platforms such as Discord, Signal, and others which may indicate data exfiltration. Threat actors have been observed using curl to exfiltrate data to these messaging platforms after compromising systems.
23.12.2025
Suspicious CMD Findstr Command with For Loop and Token Parsing
Detects suspicious command patterns using findstr with for loops and token/delimiter parsing that may indicate data extraction and processing techniques. Adversaries may use findstr combined with for loops to search, extract, and parse specific content from files or command output, often as part of reconnaissance or data exfiltration activities.
17.12.2025
Linux Suspicious Child Process from Node.js - React2Shell
Detects suspicious child processes spawned from Node.js server processes on Linux systems, potentially indicating remote code execution exploitation such as CVE-2025-55182 (React2Shell). This rule particularly looks for exploitation of vulnerability on Node.js Servers where attackers abuse Node.js child_process module to execute arbitrary system commands. When execSync() or exec() is used, the command line often includes a shell invocation followed by suspicious commands or scripts (e.g., /bin/sh -c <malicious-command>). For other methods, the Image field will show the spawned process directly.
05.12.2025
Windows Suspicious Child Process from Node.js - React2Shell
Detects suspicious child processes started by Node.js server processes on Windows, which may indicate exploitation of vulnerabilities like CVE-2025-55182 (React2Shell). Attackers can abuse the Node.js 'child_process' module to run system commands or scripts using methods such as spawn(), exec(), execFile(), fork(), or execSync(). If execSync() or exec() is used in the exploit, the command line often shows a shell (e.g., cmd.exe /d /s /c ...) running a suspicious command unless other shells are explicitly invoked. For other methods, the spawned process appears directly in the Image field unless a shell is explicitly used.
05.12.2025
Github Self-Hosted Runner Execution
Detects GitHub self-hosted runners executing workflows on local infrastructure that could be abused for persistence and code execution. Shai-Hulud is an npm supply chain worm targeting CI/CD environments. It installs runners on compromised systems to maintain access after credential theft, leveraging their access to secrets and internal networks.
29.11.2025
Suspicious Loading of Dbgcore/Dbghelp DLLs from Uncommon Location
Detects loading of dbgcore.dll or dbghelp.dll from uncommon locations such as user directories. These DLLs contain the MiniDumpWriteDump function, which can be abused for credential dumping purposes or in some cases for evading EDR/AV detection by suspending processes.
27.11.2025
WerFaultSecure Loading DbgCore or DbgHelp - EDR-Freeze
Detects WerFaultSecure.exe loading dbgcore.dll or dbghelp.dll which contains the MiniDumpWriteDump function. The MiniDumpWriteDump function creates a minidump of a process by suspending all threads in the target process to ensure a consistent memory snapshot. The EDR-Freeze technique abuses WerFaultSecure.exe running as a Protected Process Light (PPL) with WinTCB protection level to suspend EDR/AV processes. By leveraging MiniDumpWriteDump's thread suspension behavior, edr-freeze allows malicious activity to execute undetected during the suspension period.
27.11.2025
AWS GuardDuty Detector Deleted Or Updated
Detects successful deletion or disabling of an AWS GuardDuty detector, possibly by an attacker trying to avoid detection of its malicious activities. Upon deletion, GuardDuty stops monitoring the environment and all existing findings are lost. Verify with the user identity that this activity is legitimate.
27.11.2025
Suspicious Process Access to LSASS with Dbgcore/Dbghelp DLLs
Detects suspicious process access to LSASS.exe from processes located in uncommon locations with dbgcore.dll or dbghelp.dll in the call trace. These DLLs contain functions like MiniDumpWriteDump that can be abused for credential dumping purposes. While modern tools like Mimikatz have moved to using ntdll.dll, dbgcore.dll and dbghelp.dll are still used by basic credential dumping utilities and legacy tools for LSASS memory access and process suspension techniques.
27.11.2025
Renamed Schtasks Execution
Detects the execution of renamed schtasks.exe binary, which is a legitimate Windows utility used for scheduling tasks. One of the very common persistence techniques is schedule malicious tasks using schtasks.exe. Since, it is heavily abused, it is also heavily monitored by security products. To evade detection, threat actors may rename the schtasks.exe binary to schedule their malicious tasks.
27.11.2025
Suspicious Process Access of MsMpEng by WerFaultSecure - EDR-Freeze
Detects process access events where WerFaultSecure accesses MsMpEng.exe with dbgcore.dll or dbghelp.dll in the call trace, indicating potential EDR freeze techniques. This technique leverages WerFaultSecure.exe running as a Protected Process Light (PPL) with WinTCB protection level to call MiniDumpWriteDump and suspend EDR/AV processes, allowing malicious activity to execute undetected during the suspension period.
27.11.2025
Grixba Malware Reconnaissance Activity
Detects execution of the Grixba reconnaissance tool based on suspicious command-line parameter combinations. This tool is used by the Play ransomware group for network enumeration, data gathering, and event log clearing.
26.11.2025
Suspicious FileFix Execution Pattern
Detects suspicious FileFix execution patterns where users are tricked into running malicious commands through browser file upload dialog manipulation. This attack typically begins when users visit malicious websites impersonating legitimate services or news platforms, which may display fake CAPTCHA challenges or direct instructions to open file explorer and paste clipboard content. The clipboard content usually contains commands that download and execute malware, such as information stealing tools.
24.11.2025
HackTool - WSASS Execution
Detects execution of WSASS, a tool used to dump LSASS memory on Windows systems by leveraging WER's (Windows Error Reporting) WerFaultSecure.EXE to bypass PPL (Protected Process Light) protections.
23.11.2025

YARA/SIGMA Rule Count

Rule Type
Community Feed
Nextron Private Feed
Yara
2715
20845
Sigma
3517
848

Sigma Rules Per Category (Community)

Type
Count
windows / process_creation
1321
windows / registry_set
214
windows / file_event
203
windows / ps_script
165
windows / security
160
linux / process_creation
129
windows / image_load
114
webserver
82
windows / system
74
macos / process_creation
68
aws / cloudtrail
55
proxy
54
windows / network_connection
53
linux / auditd
53
azure / activitylogs
42
windows / registry_event
40
azure / auditlogs
38
windows / ps_module
33
windows / application
31
windows / dns_query
26
windows / process_access
25
azure / signinlogs
24
okta / okta
22
azure / riskdetection
19
opencanary / application
18
windows / pipe_created
18
rpc_firewall / application
17
gcp / gcp.audit
16
windows / windefend
16
github / audit
16
linux
16
bitbucket / audit
14
m365 / threat_management
13
windows / file_delete
13
linux / file_event
13
cisco / aaa
12
windows / create_remote_thread
12
windows / codeintegrity-operational
10
windows / driver_load
10
kubernetes / application / audit
10
windows / ps_classic_start
9
dns
9
windows / create_stream_hash
9
windows / registry_delete
9
windows / firewall-as
8
windows / msexchange-management
8
zeek / smb_files
7
gcp / google_workspace.admin
7
antivirus
7
fortigate / event
7
windows / appxdeployment-server
7
windows / file_access
7
windows / bits-client
7
azure / pim
7
windows / dns-client
6
zeek / dns
5
zeek / http
5
linux / network_connection
5
jvm / application
5
kubernetes / audit
5
windows / sysmon
4
windows / iis-configuration
4
windows / taskscheduler
4
zeek / dce_rpc
4
windows / registry_add
3
linux / sshd
3
m365 / audit
3
macos / file_event
3
windows / wmi_event
3
windows / powershell-classic
3
windows / ntlm
3
windows / security-mitigations
2
linux / syslog
2
apache
2
windows / dns-server
2
spring / application
2
onelogin / onelogin.events
2
firewall
2
windows / file_change
2
windows / capi2
1
nodejs / application
1
paloalto / appliance / globalprotect
1
windows / microsoft-servicebus-client
1
windows / file_executable_detected
1
windows / diagnosis-scripted
1
python / application
1
zeek / rdp
1
windows / smbclient-security
1
windows / file_rename
1
m365 / exchange
1
windows / terminalservices-localsessionmanager
1
windows / sysmon_error
1
ruby_on_rails / application
1
m365 / threat_detection
1
zeek / kerberos
1
windows / driver-framework
1
windows
1
windows / sysmon_status
1
sql / application
1
cisco / bgp
1
nginx
1
linux / sudo
1
velocity / application
1
cisco / duo
1
cisco / ldp
1
windows / ldap
1
windows / wmi
1
windows / dns-server-analytic
1
windows / ps_classic_provider_start
1
windows / printservice-admin
1
windows / applocker
1
windows / lsa-server
1
windows / printservice-operational
1
database
1
linux / clamav
1
django / application
1
linux / auth
1
linux / guacamole
1
huawei / bgp
1
windows / appmodel-runtime
1
windows / openssh
1
fortios / sslvpnd
1
juniper / bgp
1
windows / appxpackaging-om
1
windows / process_tampering
1
cisco / syslog
1
linux / cron
1
windows / smbserver-connectivity
1
windows / smbclient-connectivity
1
zeek / x509
1
windows / certificateservicesclient-lifecycle-system
1
windows / shell-core
1
windows / raw_access_thread
1
paloalto / file_event / globalprotect
1
linux / vsftpd
1

Sigma Rules Per Category (Nextron Private Feed)

Type
Count
windows / process_creation
399
windows / registry_set
79
windows / ps_script
77
windows / image_load
44
windows / file_event
43
linux / process_creation
37
windows / wmi
29
windows / security
24
proxy
12
windows / system
9
windows / registry_event
8
windows / network_connection
8
windows / kernel-event-tracing
6
windows / ntfs
5
windows / ps_module
5
windows / create_remote_thread
4
windows / registry_delete
4
windows / pipe_created
4
windows / sense
4
windows / taskscheduler
4
windows / driver_load
3
windows / hyper-v-worker
3
windows / ps_classic_script
3
webserver
3
windows / vhd
3
windows / application-experience
3
macos / process_creation
2
windows / codeintegrity-operational
2
windows / file_delete
2
windows / bits-client
2
windows / kernel-shimengine
2
windows / windefend
2
windows / process_access
2
windows / process-creation
2
windows / firewall-as
1
windows / file_access
1
windows / registry-setinformation
1
linux / file_event
1
windows / dns_query
1
windows / file_rename
1
windows / audit-cve
1
windows / amsi
1
windows / application
1

Tenable Nessus

Requirement: Privileged Scan

  • YARA Scanning with Nessus works only when scanning with credentials (privileged scan)
Tutorial: https://docs.tenable.com/nessus/Content/CredentialedChecksOnWindows.htm

YARA Scanning with Nessus

  • You can only upload a single .yar file
  • Filesystem scan has to be activated
  • You have to define the target locations
  • The Nessus plugin ID will be 91990
  • Only files with the following extensions can be scanned: .application, .asp, .aspx, .bat, .chm, .class, .cmd, .com, .cp, .csh, .dl, .doc, .docx, .drv, .exe, .gadget, .hta, .inf, .ins, .inx, .isu, .jar, .job, .jpeg, .jpg, .js, .jse, .jse, .jsp, .lnk, .msc, .msi, .msp, .mst, .paf, .pdf, .php, .pif, .ppt, .pptx, .ps1, .ps1xm, .ps2, .ps2xm, .psc1, .psc2, .reg, .rgs, .scf, .scr, .sct, .shb, .shs, .swf, .sys, .u3p, .vb, .vbe, .vbs, .vbscript, .ws, .wsf, .xls, .xls
Tutorial: https://de.tenable.com/blog/threat-hunting-with-yara-and-nessus

Carbon Black

Tutorial: https://github.com/carbonblack/cb-yara-connector

FireEye EX

Tutorial: https://www.fireeye.com/blog/products-and-services/2018/12/detect-and-block-email-threats-with-custom-yara-rules.html