Valhalla Logo
currently serving 23865 YARA rules and 4536 Sigma rules
API Key

New Rules per Day

Newest YARA Rules

This table shows the newest additions to the YARA rule set

Rule
Description
Date
Ref
HKTL_RedSun_Privilege_Escalation_Apr26
Detects RedSun hacktool used for privilege escalation through Microsoft Defender.
16.04.2026
MAL_Stealer_Loader_Apr26
Detects a generic stealer loader
13.04.2026
WEBSHELL_PHP_Dropper_Cookie_Controller_Apr26
Detects bash droppers for cookie controlled PHP webshells
13.04.2026
WEBSHELL_PHP_Cookie_Controller_Apr26
Detects cookie controlled PHP webshells
13.04.2026
SUSP_Praetorian_Inc_Apr26
Detects Go based binaries by Praetorian Inc which creates scanners and hack tools
13.04.2026
MAL_Sero_RAT_Apr26
Detects SeroRAT, a remote access trojan that has been observed in the wild. It is known for its ability to evade detection and maintain persistence on infected systems, seen being dropped by Amadey botnet.
09.04.2026
SUSP_NET_Loader_Apr26
Detects obfuscated .NET in-memory loader leveraging reflection and byte array payload execution
08.04.2026
MAL_SilentConnect_Loader_Apr26
Detects SilentConnect loader written in C# that uses reflection, NTAPI, and in-memory execution to silently install a ScreenConnect remote access client
08.04.2026
MAL_PS1_AddMpPreference_Char_Obfuscation_Apr26
Detects obfuscated PowerShell used by malware to disable Microsoft Defender protections via exclusion rules.
08.04.2026
MAL_Lumma_Stealer_Variants_Apr26
Detects Remus and Tenzor a Lumma stealer variants
08.04.2026
MAL_PY_Dropper_Apr26
Detects malicious PyPI dropper
07.04.2026
SUSP_PY_Dropper_Apr26
Detects suspicious usage of Python's base64 and subprocess libraries
07.04.2026
HKTL_Wiretap_RS_Apr26
Detects Wiretap RS - a transparent, VPN-like proxy server that tunnels traffic via WireGuard and requires no special privileges to run.
07.04.2026
HKTL_BlueHammer_Apr26
Detects Nightmare-Eclipse/BlueHammer (FunnyApp), a Windows local privilege escalation PoC that abuses a Defender signature-update RPC and a junction/symlink race to leak the SAM hive and derive NTLM hashes - giving an unprivileged user full SYSTEM-level credential access.
07.04.2026
SUSP_BOF_Indicators_Proc_Eval_Apr26
Detects suspicious code found in a larger BOF file sample analysis set (whoami BOF)
07.04.2026
HKTL_BOF_NanoDump_Apr26
Detects strings found in NanoDump BOF samples. NanoDump is a BOF that can be used to dump the memory of a process and is often used in post-exploitation scenarios to dump LSASS and extract credentials from it.
07.04.2026
SUSP_BOF_Indicators_Process_Manip_Apr26
Detects suspicious code found in a larger BOF file sample analysis set that is related to process manipulation
07.04.2026
MAL_TangleCrypt_Apr26
Detects TangleCrypt packer seen being used by multiple malware families
06.04.2026
MAL_CrystalX_RAT_Apr26
Detects CrystalX RAT written in Go, featuring WebSocket C2 communication, remote access capabilities, credential stealing, keylogging, clipboard hijacking, and prankware-style system manipulation, including user disruption and remote screen control
06.04.2026
MAL_RANSOM_Payload_Apr26
Detects Payload ransomware
06.04.2026
PUA_ThrottleStop_Driver_Apr26
Detects the ThrottleStop driver, a high-privilege hardware access driver used by legitimate software, but also observed in ransomware campaigns for EDR/AV tampering and termination via IOCTL abuse.
05.04.2026
HKTL_ScanPortPlus_Apr26
Detects ScanPortPlus, a custom, go-based network scanning tool used by the chinese threat actor group CL-UNK-1068
03.04.2026
HKTL_SRunas_Apr26
Detects srunas.exe, custom hacking tool used to escalate privileges
03.04.2026
SUSP_BOF_Indicators_Beacon_Apr26
Detects malicious beacon code found in a larger BOF file sample analysis set
03.04.2026
HKTL_BOF_Indicators_LSA_Whisperer_Apr26
Detects malicious LSA Whisperer code found in a larger BOF file sample analysis set
03.04.2026
SUSP_BOF_Indicators_Apr26_1
Detects suspicious function names and strings found in a larger BOF file sample analysis set
03.04.2026
SUSP_BOF_Indicators_Apr26_2
Detects suspicious strings found in a larger BOF file sample analysis set
03.04.2026
HKTL_SCShell_BOF_Indicators_Apr26
Detects strings found in SCShell BOF samples. SCShell is a fileless lateral movement tool that relies on ChangeServiceConfigA to run commands. The beauty of this tool is that it does not perform authentication against SMB. Everything is performed over DCERPC.
03.04.2026
SUSP_BOF_Indicators_CredPrompt_Apr26
Detects suspicious strings found in a larger BOF file sample analysis set that are related to credential prompts
03.04.2026
HKTL_BOF_Indicators_DNSTool_Apr26
Detects DNSTool-BOF code found in a larger BOF file sample analysis set. DNSTool-BOF is a BOF that can be used to perform DNS queries and exfiltrate data over DNS.
03.04.2026

Successful YARA Rules in Set

This table shows statistics of the best rules with lowest AV detection rates (rules created in the last 12 months, matches of the last 14 days)

Rule
Average AV Detection Rate
Sample Count
Info
VT
MAL_GuLoader_Shellcode_Oct22_3
0.0
20
SUSP_MAL_EXFIL_Stealer_Output_Characteristics_Sep22_1
0.04
180
SUSP_PY_OBFUSC_Berserker_Indicators_Dec22_1
0.21
14
SUSP_BAT_OBFUSC_Apr23_2
0.59
64
SUSP_Encrypted_ZIP_Suspicious_Contents_Jul23_1_File
0.64
11
SUSP_PUA_RustDesk_Apr23_1
0.68
22
SUSP_BAT_PS1_Combo_Jan23_2
0.71
45
SUSP_JS_OBFUSC_Feb23_2
1.04
1736
SUSP_WEvtUtil_ClearLogs_Sep22_1
1.12
43
SUSP_CryptBase_PE_Info_NOT_Cryptbase_Feb23
1.19
21
SUSP_OBFUSC_PY_Loader_Jun23_1
1.48
21
SUSP_Webshell_OBFUSC_Indicators_Aug22_1
2.07
14
SUSP_URL_Split_Jun23
2.5
18
SUSP_OBFUSC_JS_Atob_Anomalies_Feb23
2.69
13
PUA_RuskDesk_Remote_Desktop_Jun23_1
2.78
18
SUSP_JS_Redirector_Mar23
2.81
108
SUSP_JS_Executing_Powershell_Apr23
3.14
274
SUSP_PY_Reverse_Shell_Indicators_Jan23_1
3.25
16
SUSP_OBFUSC_JS_Execute_Base64_Mar23
3.26
34
SUSP_Encoded_Registry_Key_Paths_Sep22_1
3.39
64
SUSP_PE_OK_RU_URL_Jun23
3.59
17
HKTL_Clash_Tunneling_Tool_Aug22_2
3.75
16
SUSP_PY_OBFUSC_Hyperion_Aug22_1
4.0
13
SUSP_BAT_OBFUSC_Apr23_1
4.0
16
SUSP_RANSOM_Note_Aug22
4.01
171
SUSP_OBFUSC_JS_Atob_Anomalies_Feb23_2
4.52
67
SUSP_BAT_PS1_Contents_Jan23_1
5.11
18
SUSP_OBFUSC_PS1_FormatStrings_Dec22_1
5.33
12
SUSP_BAT_OBFUSC_Apr23_4
5.35
26
SUSP_OBFUSC_BAT_Dec22_1
5.84
31

Latest YARA Matches with Low AV Detection Rate

This table lists the last matches with low AV detection rates (between 0 and 15 AV engines matched)

Rule
AVs
Hash
VT
SUSP_DLL_DllSafeCheck64_Indicators_Nov25
3
e806e15fb7652162721959398c45064fd71f292d4800d482d978d6df0d1f82c3
SUSP_InnoSetup_IDP_May25
1
56fbe9417429538a3809d310ab67874096f1d08b40bc219e8ab408a498acf1e9
SUSP_B64_Atob_Aug23
8
9ad09d5e120b319fa39f9a74a5863a4898f573996d4e7ccddbc5ade6bc7b5693
SUSP_B64_Atob_Aug23
8
4e776e45c587b7f079bf1c05451f5d9e4cfaf25ba89398b66da88688648e1fb3
SUSP_B64_Atob_Aug23
8
5cda4fdc244343453fd2d363a0963399ed5f9f9670f21e6b8efa544122b51be2
SUSP_B64_Atob_Aug23
8
cbbf50accc59502e8f8d2917f2d80a4f5b8a0d16f95b4e3d0b61f48ec99de939
OpJinZhuren_xmrig_conhost1
12
b9efb73ddb7f1d307a4000a86a9bd51fedee3b8a7eb3ed3f8bddd9d76429a27c
SUSP_B64_Atob_Aug23
8
d71e0580d4e121464ac9d915074928adc08cf73f4c1843c0a6bf5b8405f1066a
SUSP_B64_Atob_Aug23
7
d4cc04ee46ff5f7bf53283a9655b29707c1202c4ab2e9942b5dc121ccaed3dce
SUSP_B64_Atob_Aug23
8
5408558612c6ff291f24cae642d95ef71eb598410f348df1041f62a2e3d91e6c
SUSP_B64_Atob_Aug23
8
104f3794b4850db480e3052ca3451ef3e049813a2c61ae5f3cd683d8835be29a
SUSP_B64_Atob_Aug23
8
09a3cd9687817952ae7362201214e6983f8b5f6f8920ea3729cd594a8e7a0f0d
SUSP_B64_Atob_Aug23
8
f0bce50ba9df8b1b1ad15d5f9ab4819f3bece531d712ec6d0620e414f6374524
SUSP_B64_Atob_Aug23
8
ab6059220b46ce28e968b36464ee7647d9d66c9ba8d0a62a6ee2986d486ec01b
MAL_Encrypted_IDAT_Payload_Mar24
1
cb38e4b723198155f45b8452f9ba150953bdfd68ef81ba309ba0d0d480b45690
MAL_Tiny_Utility_Module_May24
4
e46bcd744063dd7b833e4f3399924fad097ebfea8b086012fd5f6b604e885d9c
HKTL_PELoad_Jan23_7
4
9af87b7f0f99fa9e3720b0533abd18f31d7be079c0dc9e1e75bb5d0fec4acf45
SUSP_B64_Atob_Aug23
8
94560716b5f0ba9697e7c71fc924a5aece807871725bd7c4c63c305a92dea4eb
SUSP_B64_Atob_Aug23
8
d406bb5a4040ab4e5eb4370db9b07fd52dd88cc66debf820e54a90007e20b3bf
SUSP_B64_Atob_Aug23
8
1bd8e2456e167742e32149ede31ee1432da493321a91751b9493e34ad50c3466

YARA Rules Per Category

This list shows the number of YARA rules in the subscribable categories (categories overlap as a rule can be in 'n' categories)

Tag
Count
Malware
7555
Threat Hunting (not subscribable, only in THOR scanner)
5862
APT
5055
Hacktools
4851
Webshells
2402
Exploits
722

Newest Sigma Rules

This table shows the newest additions to the Sigma rule set

Rule
Description
Date
Ref
Info
Potential Rogue Virtual Machine Execution via VMX
Detects potential rogue virtual machine execution via direct vmx binary execution with -x argument, which bypasses vCenter visibility and registration workflows. This technique may be used by adversaries to maintain persistence within a virtualized environment.
09.04.2026
Credential Dumping via Volatility Framework
Detects potential credential dumping activities using the Volatility memory forensics framework
09.04.2026
Registry Query for Installed Software via Reg.Exe
Detects usage of reg.exe to enumerate installed software via registry queries. Adversaries may use reg.exe to query registry keys that list installed software as part of their reconnaissance activities to identify potential targets or gather information about the software environment.
03.04.2026
Potential IIS Reconnaissance via AppCmd.Exe Utility
Detects potential reconnaissance activity targeting Internet Information Services (IIS) web servers through the use of the AppCmd.exe utility. AppCmd.exe is a command-line tool used for managing IIS configurations and can be leveraged by attackers to gather information about the server environment, including sites, application pools, and modules.
03.04.2026
Suspicious CMD Echo of JavaScript Script Tag to File or Pipe
Detects usage of 'cmd /c echo <script...' with output redirected to a file or piped which may indicate suspicious JavaScript injection or script drop activity or one-liner script execution attempts. Attackers may use this technique to create or execute JavaScript code on the target system, potentially for malicious purposes such as downloading and executing additional payloads, or for persistence. Investigation of such events should consider the context of the command execution, including the content being echoed and the destination of the output.
03.04.2026
Potential User Profile Reconnaissance via CommandLine
Detects potential user profile reconnaissance activity by identifying command-line executions of 'cmd.exe' and 'reg.exe' that query user directories and registry keys associated with user profiles.
03.04.2026
Suspicious Download and Execution Pattern via VSCode/Cursor Tasks - Linux
Detects suspicious patterns where Visual Studio Code or Cursor spawns processes that both download and execute files, which may indicate abuse of the `tasks.json` configuration for malicious purposes. This technique has been observed in campaigns such as "Contagious Interview," where adversaries leverage VSCode's workspace trust model to execute arbitrary code by embedding malicious commands in `tasks.json`. Attackers may craft or alter `tasks.json` to automatically trigger downloads and execution of payloads when a user opens and trusts a workspace in VSCode or Cursor, enabling initial access or further compromise.
02.04.2026
DNS Exfiltration via DNSExfiltrator - Network
Detects DNS exfiltration activity using the DNSExfiltrator tool, which encodes data in DNS queries using certain encoding.
02.04.2026
Suspicious Download and Execution Pattern via VSCode Tasks
Detects suspicious patterns where Visual Studio Code (VSCode) spawns processes that both download and execute files, which may indicate abuse of the `tasks.json` configuration for malicious purposes. This technique has been observed in campaigns such as "Contagious Interview," where adversaries leverage VSCode's workspace trust model to execute arbitrary code by embedding malicious commands in `tasks.json`. Attackers may craft or alter `tasks.json` to automatically trigger downloads and execution of payloads when a user opens and trusts a workspace in VSCode, enabling initial access or further compromise.
02.04.2026
Unusually Long DNS Query - Network
Detects unusually long DNS queries that may indicate DNS tunneling, data exfiltration attempts, or C2 communication. Usage of DNS for C&C communication or data exfiltration often involves crafting long DNS queries to encode information.
02.04.2026
Unusually Long DNS Query
Detects unusually long DNS queries that may indicate DNS tunneling, data exfiltration attempts, or C2 communication. Usage of DNS for C&C communication or data exfiltration often involves crafting long DNS queries to encode information.
02.04.2026
File Operation via .NET Class
Detects the use of dotnet method in command lines which could be used for unauthorized file operations such as copying files. It could indicate suspicious activity because there are many normal ways to copy files in Windows, thus adversary may use this rarely used method to avoid detection.
02.04.2026
Suspicious Download and Piping to Interpreters Pattern
Detects the usage of download utilities like curl or wget followed by piping the downloaded content directly into an interpreter such as Node.js, Python, Bash, PowerShell, Perl, or Ruby. This pattern is often used by attackers to download and execute malicious scripts or payloads directly in memory, bypassing traditional file-based detection mechanisms. Review thee process lineage for context to determine if the activity is legitimate or malicious.
02.04.2026
DNS Exfiltration via DNSExfiltrator
Detects DNS exfiltration activity using the DNSExfiltrator tool, which encodes data in DNS queries using certain encoding.
02.04.2026
VSCode Tasks.json File Creation
Detects the creation of `.vscode/tasks.json` files which can be abused to auto-run malicious scripts when a VSCode workspace is opened and trusted by the user. This technique was observed in the "Contagious Interview" campaign where threat actors exploited VS Code's workspace trust model to execute malicious tasks upon opening a new project. Attackers may create or modify `tasks.json` to define tasks that run malicious commands or scripts automatically when the workspace is opened and trusted by the user. Legitimate use cases include developers configuring build or deployment tasks, but unexpected creation of such files in unfamiliar projects may indicate malicious activity.
02.04.2026
Suspicious File Rename
Detects suspicious renaming of benign file types such as documents or images to executable file types. Threat actors often drops files with innocent extensions and later rename them to executable formats during execution to evade detection.
02.04.2026
Axios NPM Compromise File Creation Indicators - Linux
Detects file creation events linked to the Axios NPM supply chain compromise. Axios is a popular JavaScript HTTP client. On March 30, 2026, malicious versions (1.14.1, 0.30.4) were published to npm, injecting a dependency (plain-crypto-js@4.2.1) that executed a postinstall script as a cross-platform RAT dropper.
01.04.2026
Axios NPM Compromise File Creation Indicators - Windows
Detects file creation events linked to the Axios NPM supply chain compromise. Axios is a popular JavaScript HTTP client. On March 30, 2026, malicious versions (1.14.1, 0.30.4) were published to npm, injecting a dependency (plain-crypto-js@4.2.1) that executed a postinstall script as a cross-platform RAT dropper. The dropper contacted a C2 server, delivered platform-specific payloads, deleted itself, and replaced package.json to evade detection. The attack used cscript.exe (VBScript), curl.exe (C2), and PowerShell masquerading as Windows Terminal.
01.04.2026
Axios NPM Compromise File Creation Indicators - MacOS
Detects file creation events linked to the Axios NPM supply chain compromise on macOS devices. Axios is a popular JavaScript HTTP client. On March 30, 2026, malicious versions (1.14.1, 0.30.4) were published to npm, injecting a dependency (plain-crypto-js@4.2.1) that executed a postinstall script as a cross-platform RAT dropper.
01.04.2026
Axios NPM Compromise Indicators - Linux
Detects the Linux-specific execution chain of the plain-crypto-js malicious npm dependency by Axios NPM package, including payload download via curl and detached execution using nohup and python3. On March 30, 2026, malicious versions (1.14.1, 0.30.4) were published to npm, injecting a dependency (plain-crypto-js@4.2.1) that executed a postinstall script as a cross-platform RAT dropper. The dropper contacted a C2 server, delivered platform-specific payloads, deleted itself, and replaced package.json to evade detection.
01.04.2026
Axios NPM Compromise Malicious C2 Domain DNS Query
Detects DNS queries for the malicious C2 domain associated with the plain-crypto-js/Axios npm package supply chain compromise. On March 30, 2026, malicious versions (1.14.1, 0.30.4) were published to npm, injecting a dependency (plain-crypto-js@4.2.1) that executed a postinstall script as a cross-platform RAT dropper. This detection detects endpoints attempting to resolve the attacker's C2 domain (sfrclak.com) used for command and control communication.
01.04.2026
Axios NPM Compromise Indicators - macOS
Detects the macOS-specific execution chain of the plain-crypto-js malicious npm dependency in Axios NPM Package, including AppleScript execution via osascript, payload download, permission modification, execution, and cleanup.
01.04.2026
Axios NPM Compromise Indicators - Windows
Detects the specific Windows execution chain and process tree associated with the Axios NPM supply chain compromise. On March 30, 2026, malicious versions (1.14.1, 0.30.4) were published to npm, injecting a dependency (plain-crypto-js@4.2.1) that executed a postinstall script as a cross-platform RAT dropper. The dropper contacted a C2 server, delivered platform-specific payloads, deleted itself, and replaced package.json to evade detection. The attack used cscript.exe (VBScript), curl.exe (C2), and PowerShell masquerading as Windows Terminal.
01.04.2026
TeamPCP LiteLLM Supply Chain Attack Persistence Indicators
Detects the creation of specific persistence files as observed in the LiteLLM PyPI supply chain attack. In March 2026, a supply chain attack was discovered involving the popular open-source LLM framework LiteLLM by Threat Actor TeamPCP. The malicious package harvests every credential on the system, encrypts and exfiltrates them, and installs a persistent C2 backdoor.
30.03.2026
LiteLLM / TeamPCP Supply Chain Attack Indicators
Detects process executions related to the backdoored versions of LiteLLM (v1.82.7 or v1.82.8). In March 2026, a supply chain attack was discovered involving the popular open-source LLM framework LiteLLM by Threat Actor TeamPCP. The malicious package harvests every credential on the system, encrypts and exfiltrates them, and installs a persistent C2 backdoor.
30.03.2026
PUA - HoboCopy Execution
Detects the execution of HoboCopy, a command-line tool that can be used to copy locked files using Volume Shadow Copy Service (VSS). This tool can be abused by attackers to copy sensitive files like SAM, SYSTEM, or NTDS.dit. Event though it can be used for legitimate backup purposes, its presence in modern Windows environments is very rare and potentially associated with malicious activity.
27.03.2026
Critical Log File Deletion on Linux System
Detects deletion of critical log files on Linux systems that may indicate log tampering or evidence destruction. This technique can be used by attackers to cover their tracks after gaining unauthorized access to a system.
26.03.2026
Critical Log Manipulation via Sed Utility
Detects critical log manipulation attempts using the sed utility with in-place editing on sensitive log files. This technique can be used by attackers to cover their tracks after gaining unauthorized access to a system.
26.03.2026
Potential Abuse of Winpty-Agent.Exe for Reconnaissance
Detects potential abuse of winpty-agent.exe, a pseudo-terminal utility commonly used by developer tools and remote monitoring software, for executing reconnaissance commands.
23.03.2026
Renamed SimpleHelp Client Binary Execution - Remote Access Software
Detects the execution of a renamed SimpleHelp client binary. These binary are executed by threat actors to connect to certain SimpleHelp servers for remote access and control. Even though it is legitimate RMM software, the use of renamed binaries is a common tactic employed by attackers to evade detection and persist on compromised systems.
23.03.2026

YARA/SIGMA Rule Count

Rule Type
Community Feed
Nextron Private Feed
Yara
2721
21144
Sigma
3561
975

Sigma Rules Per Category (Community)

Type
Count
windows / process_creation
1340
windows / registry_set
219
windows / file_event
208
windows / ps_script
166
windows / security
160
linux / process_creation
137
windows / image_load
113
webserver
82
windows / system
74
macos / process_creation
69
aws / cloudtrail
55
proxy
54
windows / network_connection
53
linux / auditd
53
azure / activitylogs
42
windows / registry_event
40
azure / auditlogs
38
windows / ps_module
33
windows / application
31
windows / dns_query
27
windows / process_access
25
azure / signinlogs
24
okta / okta
22
azure / riskdetection
19
opencanary / application
18
windows / pipe_created
18
rpc_firewall / application
17
linux
16
gcp / gcp.audit
16
windows / windefend
16
github / audit
15
linux / file_event
15
bitbucket / audit
14
windows / file_delete
13
m365 / threat_management
13
cisco / aaa
12
windows / create_remote_thread
12
windows / driver_load
10
windows / registry_delete
10
kubernetes / application / audit
10
windows / codeintegrity-operational
10
dns
10
windows / ps_classic_start
9
windows / create_stream_hash
9
windows / appxdeployment-server
9
windows / firewall-as
8
windows / msexchange-management
8
windows / file_access
7
azure / pim
7
windows / bits-client
7
gcp / google_workspace.admin
7
zeek / smb_files
7
antivirus
7
fortigate / event
7
windows / dns-client
6
jvm / application
5
kubernetes / audit
5
zeek / dns
5
linux / network_connection
5
zeek / http
5
zeek / dce_rpc
4
macos / file_event
4
windows / sysmon
4
windows / taskscheduler
4
windows / iis-configuration
4
linux / sshd
3
windows / registry_add
3
m365 / audit
3
windows / wmi_event
3
windows / powershell-classic
3
windows / ntlm
3
windows / security-mitigations
2
linux / syslog
2
windows / dns-server
2
spring / application
2
apache
2
onelogin / onelogin.events
2
firewall
2
fortios / sslvpnd
1
linux / guacamole
1
huawei / bgp
1
windows / applocker
1
windows / openssh
1
cisco / syslog
1
juniper / bgp
1
windows / appxpackaging-om
1
windows / smbclient-connectivity
1
windows / smbserver-connectivity
1
windows / process_tampering
1
paloalto / file_event / globalprotect
1
windows / capi2
1
windows / file_change
1
nodejs / application
1
paloalto / appliance / globalprotect
1
zeek / x509
1
windows / certificateservicesclient-lifecycle-system
1
windows / shell-core
1
windows / raw_access_thread
1
linux / vsftpd
1
windows / microsoft-servicebus-client
1
python / application
1
windows / diagnosis-scripted
1
windows / smbclient-security
1
windows / file_executable_detected
1
m365 / exchange
1
zeek / rdp
1
windows / file_rename
1
windows / sysmon_status
1
ruby_on_rails / application
1
m365 / threat_detection
1
zeek / kerberos
1
windows / terminalservices-localsessionmanager
1
windows / sysmon_error
1
windows / driver-framework
1
sql / application
1
windows
1
linux / sudo
1
velocity / application
1
cisco / duo
1
cisco / ldp
1
nginx
1
windows / dns-server-analytic
1
cisco / bgp
1
windows / ldap
1
windows / wmi
1
windows / printservice-admin
1
windows / ps_classic_provider_start
1
windows / printservice-operational
1
database
1
linux / clamav
1
windows / appmodel-runtime
1
windows / lsa-server
1
django / application
1
linux / auth
1
linux / cron
1

Sigma Rules Per Category (Nextron Private Feed)

Type
Count
windows / process_creation
473
windows / registry_set
86
windows / ps_script
85
linux / process_creation
49
windows / file_event
47
windows / image_load
46
windows / wmi
29
windows / security
28
windows / system
13
proxy
12
windows / network_connection
8
windows / registry_event
8
windows / kernel-event-tracing
6
windows / ps_module
5
windows / ntfs
5
windows / sense
4
windows / pipe_created
4
windows / taskscheduler
4
windows / create_remote_thread
4
windows / registry_delete
4
windows / dns_query
4
windows / ps_classic_script
3
dns
3
webserver
3
windows / application-experience
3
windows / vhd
3
windows / hyper-v-worker
3
windows / driver_load
3
linux / file_event
2
macos / process_creation
2
windows / smbclient-security
2
windows / process_access
2
windows / windefend
2
windows / bits-client
2
windows / process-creation
2
windows / file_access
2
windows / kernel-shimengine
2
windows / file_delete
2
windows / codeintegrity-operational
2
windows / audit-cve
1
windows / application
1
windows / firewall-as
1
windows / registry_add
1
windows / registry-setinformation
1
windows / amsi
1
linux / file_delete
1
windows / file_rename
1

Tenable Nessus

Requirement: Privileged Scan

  • YARA Scanning with Nessus works only when scanning with credentials (privileged scan)
Tutorial: https://docs.tenable.com/nessus/Content/CredentialedChecksOnWindows.htm

YARA Scanning with Nessus

  • You can only upload a single .yar file
  • Filesystem scan has to be activated
  • You have to define the target locations
  • The Nessus plugin ID will be 91990
  • Only files with the following extensions can be scanned: .application, .asp, .aspx, .bat, .chm, .class, .cmd, .com, .cp, .csh, .dl, .doc, .docx, .drv, .exe, .gadget, .hta, .inf, .ins, .inx, .isu, .jar, .job, .jpeg, .jpg, .js, .jse, .jse, .jsp, .lnk, .msc, .msi, .msp, .mst, .paf, .pdf, .php, .pif, .ppt, .pptx, .ps1, .ps1xm, .ps2, .ps2xm, .psc1, .psc2, .reg, .rgs, .scf, .scr, .sct, .shb, .shs, .swf, .sys, .u3p, .vb, .vbe, .vbs, .vbscript, .ws, .wsf, .xls, .xls
Tutorial: https://de.tenable.com/blog/threat-hunting-with-yara-and-nessus

Carbon Black

Tutorial: https://github.com/carbonblack/cb-yara-connector

FireEye EX

Tutorial: https://www.fireeye.com/blog/products-and-services/2018/12/detect-and-block-email-threats-with-custom-yara-rules.html