Valhalla Logo
currently serving 24094 YARA rules and 4588 Sigma rules
API Key

New Rules per Day

Newest YARA Rules

This table shows the newest additions to the YARA rule set

Rule
Description
Date
Ref
MAL_TCLBanker_Loader_May26
Detects TCLBanker used to load a RAT in the next stage. TCLBanker is an evasive malware focused on online banking credential theft in the LATAM region.
10.05.2026
EXPL_LNX_DirtyFrag_ForensicArtefacts_May26
Detects DirtyFrag exploit code POC usage in Linux environments
08.05.2026
MAL_Cobalt_Strike_Veeam_Dumper_Beacon_May26
Detects Cobalt Strike beacon designed to extract credentials from Veeam backup solutions.
08.05.2026
SUSP_ELF_EXPL_Indicators_May26
Detects suspicious indicators in ELF files or source code related to public exploit PoCs, including specific strings and code fragments observed in online proof-of-concept material.
08.05.2026
EXPL_LNX_DirtyFragLPE_May26
Detects dirtyfrag, a local privilege escalation exploit for Linux.
07.05.2026
EXPL_HKTL_LNX_DirtyFragShellcode_May26
Detects a shellcode observed in dirtyfrag, a local privilege escalation exploit for Linux.
07.05.2026
MAL_LotusLite_ShellCode_Loader_May26
Detects a loader used to load a shellcode in memory to be used to download and execute the LotusLite backdoor deployed by Mustang Panda APT group.
06.05.2026
MAL_LotusLite_ShellCode_May26
Detects a shellcode used to download and execute the LotusLite backdoor deployed by Mustang Panda APT group.
06.05.2026
HKTL_NET_Edge_Saved_Passwords_Dumper_May26
Detects an .NET based tool used to dump saved passwords from Microsoft Edge browser processes
05.05.2026
PUA_VULN_Driver_CrackProof_Antitamper_May26
Detects vulnerable Windows kernel driver that protects any program against access to memory, making it opaque to EDRs and debuggers
05.05.2026
MAL_APT_LotusLite_Backdoor_May26
Detects LotusLite backdoor that establishes persistence, communicates with a C2 server using custom beaconing packets, and enables remote command execution, file operations, shell management, seen being used by Mustang Panda APT group.
05.05.2026
MAL_APT_UNC6692_SnowBelt_Chrome_Extension_Backdoor_May26
Detects SnowBelt backdoor which is delivered via a Chrome extension and communicates with an S3 bucket, it also push commands to SnowBasin through which acts as a local agent on the infected system, seen being used by UNC6692 APT group
05.05.2026
MAL_APT_UNC6692_SnowBasin_Backdoor_May26
Detects SnowBasin backdoor written in Python, a local agent used by UNC6692 APT group to execute commands on the infected system.
05.05.2026
MAL_Information_Collector_May26
Detects reconaissance payload used in the DAEMON Tools supplychain compromise. The tools collects detailed information about the infected system like hardware, installed software, running processes etc. all data is exfilled to an attacker controlled server.
05.05.2026
MAL_DAEMON_Tools_Lite_Compromised_May26
Detects compromised DAEMON Tools Lite versions deployed in a supplychain compromise campaign affected versions include: 12.5.0.2421 up to 12.5.0.2434 The infected binaries drop Quic RAT and various custom data exfiltration payloads.
05.05.2026
MAL_Backdoor_May26
Detects a backdoor smuggled into signed DAEMON Tools binaries via supply-chain compromise, receives encrypted commands over HTTPS to execute arbitrary shell commands and drop files on victim hosts.
05.05.2026
MAL_Minimalistic_Backdoor_May26
Detects minimalistic backdoor deployment where a shellcode loader downloads an encrypted payload and executes it in memory after RC4 decryption using a command-line provided key
05.05.2026
HKTL_PolyEngine_Loader_May26
Detects PolyEngine an evasive PE packer designed for EDR and AV bypassing.
05.05.2026
MAL_ShellCode_Loader_May26
Detects a shellcode loader that's being used in the wild to deliver multiple payloads like (MimiKatz,Emotet, etc.)
04.05.2026
MAL_Mini_Shai_Hulud_May26
Detects malicious indicators related to Mini Shai Hulud supply chain attacks
04.05.2026
SUSP_Bun_Runtime_May26
Detects usage of Bun JavaScript runtime in combination with environment checks
04.05.2026
HKTL_TailVNC_May26
Detects TailVNC, a Tailscale-based Windows VNC persistence tool, embedding a full WireGuard peer and RFB server into a single drop-in binary
04.05.2026
MAL_DLL_Shellcode_Loader_May26
Detects a DLL shellcode loader, seen being used to load Cobalt Strike shellcode
04.05.2026
MAL_NET_Implant_May26
Detects unknown .NET implants uploaded from Russian sources in May 2026
02.05.2026
MAL_OXIDE_C2_Implants_May26
Detects unknown OXIDE implants
02.05.2026
SUSP_Go_Loader_May26
Detects an unknown Go based loader used to load Sliver payloads
02.05.2026
MAL_Implants_Unknown_May26_2
Detects unknown implants
02.05.2026
SUSP_EXPL_POC_Code_Indicators_May26_2
Detects Python code characteristics used by Chinese threat actors in exploit PoCs, including specific strings and code fragments observed in online proof-of-concept material.
02.05.2026
APT_MAL_Injector_May26
Detects an injector that injects shellcode to run attacker commands on the victim host, seen being used by Bitter APT group
01.05.2026
APT_MAL_DLL_Launcher_May26
Detects a masquerading DLL launcher that executes from a TLS callback to download a second-stage payload via bitsadmin and run it inside a legitimate Windows process for stealthy persistence, seen being used by Bitter APT group
01.05.2026

Successful YARA Rules in Set

This table shows statistics of the best rules with lowest AV detection rates (rules created in the last 12 months, matches of the last 14 days)

Rule
Average AV Detection Rate
Sample Count
Info
VT
MAL_GuLoader_Shellcode_Oct22_3
0.0
20
SUSP_MAL_EXFIL_Stealer_Output_Characteristics_Sep22_1
0.04
180
SUSP_PY_OBFUSC_Berserker_Indicators_Dec22_1
0.21
14
SUSP_BAT_OBFUSC_Apr23_2
0.59
64
SUSP_Encrypted_ZIP_Suspicious_Contents_Jul23_1_File
0.64
11
SUSP_PUA_RustDesk_Apr23_1
0.68
22
SUSP_BAT_PS1_Combo_Jan23_2
0.71
45
SUSP_JS_OBFUSC_Feb23_2
1.04
1736
SUSP_WEvtUtil_ClearLogs_Sep22_1
1.12
43
SUSP_CryptBase_PE_Info_NOT_Cryptbase_Feb23
1.19
21
SUSP_OBFUSC_PY_Loader_Jun23_1
1.48
21
SUSP_Webshell_OBFUSC_Indicators_Aug22_1
2.07
14
SUSP_URL_Split_Jun23
2.5
18
SUSP_OBFUSC_JS_Atob_Anomalies_Feb23
2.69
13
PUA_RuskDesk_Remote_Desktop_Jun23_1
2.78
18
SUSP_JS_Redirector_Mar23
2.81
108
SUSP_JS_Executing_Powershell_Apr23
3.14
274
SUSP_PY_Reverse_Shell_Indicators_Jan23_1
3.25
16
SUSP_OBFUSC_JS_Execute_Base64_Mar23
3.26
34
SUSP_Encoded_Registry_Key_Paths_Sep22_1
3.39
64
SUSP_PE_OK_RU_URL_Jun23
3.59
17
HKTL_Clash_Tunneling_Tool_Aug22_2
3.75
16
SUSP_PY_OBFUSC_Hyperion_Aug22_1
4.0
13
SUSP_BAT_OBFUSC_Apr23_1
4.0
16
SUSP_RANSOM_Note_Aug22
4.01
171
SUSP_OBFUSC_JS_Atob_Anomalies_Feb23_2
4.52
67
SUSP_BAT_PS1_Contents_Jan23_1
5.11
18
SUSP_OBFUSC_PS1_FormatStrings_Dec22_1
5.33
12
SUSP_BAT_OBFUSC_Apr23_4
5.35
26
SUSP_OBFUSC_BAT_Dec22_1
5.84
31

Latest YARA Matches with Low AV Detection Rate

This table lists the last matches with low AV detection rates (between 0 and 15 AV engines matched)

Rule
AVs
Hash
VT
SUSP_MSIL_NET_OBF_ConfuserEx_Constants_Jul23
1
8052369182062d286c7e3d05f2310d165d195cbecdaccd8a5cd976f4a7702e07
SUSP_PS1_Loader_Indicator_Nov21_3
1
2ed6dcc29745d7a45bc04819fa4aa0617a156141937c72ddf40aa2c21b7184d1
SUSP_PS1_OBFUSC_Shell_Mar25
5
3367e92e6fe514bb20083fbc74932c4c3377985389628bcfaee841462bf1b4f8
HKTL_PS1_OBFUSC_Loaders_Jul22_1
5
3367e92e6fe514bb20083fbc74932c4c3377985389628bcfaee841462bf1b4f8
HKTL_PS1_Shells_Indicators_Feb22_1
5
3367e92e6fe514bb20083fbc74932c4c3377985389628bcfaee841462bf1b4f8
SUSP_ShellStorm_Shell_Feb23
5
3367e92e6fe514bb20083fbc74932c4c3377985389628bcfaee841462bf1b4f8
SUSP_LNX_Reverse_Shell_Indicator_PowerShell_Jun21_1
5
3367e92e6fe514bb20083fbc74932c4c3377985389628bcfaee841462bf1b4f8
SUSP_PS1_HKTL_Indicators_Jan25_1
5
3367e92e6fe514bb20083fbc74932c4c3377985389628bcfaee841462bf1b4f8
SUSP_LNX_RevShell_Payloads_Jun21_1
5
3367e92e6fe514bb20083fbc74932c4c3377985389628bcfaee841462bf1b4f8
SUSP_PS1_IEX_Pattern_Oct21_1
5
3367e92e6fe514bb20083fbc74932c4c3377985389628bcfaee841462bf1b4f8
SUSP_PS1_Shells_Indicators_Feb22_1
5
3367e92e6fe514bb20083fbc74932c4c3377985389628bcfaee841462bf1b4f8
SUSP_PS1_Command_Rare_CmdLine_Arguments_Jan20
2
33c3cb8fbc968317add75230f0699ed244bc76e81c1bc7bd8a8284a52f69a4ca
SUSP_FromBase64_StartProcess_Combo_Mar21_1
2
33c3cb8fbc968317add75230f0699ed244bc76e81c1bc7bd8a8284a52f69a4ca
SUSP_OBFUSC_PowerShell_Indicator_Jun20_1
2
33c3cb8fbc968317add75230f0699ed244bc76e81c1bc7bd8a8284a52f69a4ca
SUSP_PS1_OBFUSC_Shell_Mar25
5
52ac1fd36404742a0c8c0ba99c20172a320e0bc1efcca78e4e1526fab53511d3
SUSP_PS1_HKTL_Indicators_Jan25_1
5
52ac1fd36404742a0c8c0ba99c20172a320e0bc1efcca78e4e1526fab53511d3
SUSP_ShellStorm_Shell_Feb23
5
52ac1fd36404742a0c8c0ba99c20172a320e0bc1efcca78e4e1526fab53511d3
HKTL_PS1_Shells_Indicators_Feb22_1
5
52ac1fd36404742a0c8c0ba99c20172a320e0bc1efcca78e4e1526fab53511d3
SUSP_ShellStorm_Shell_Feb23
8
d2a461abd0d4d1ddedc20fab5b022f17f5f223ced27de479716108f3c5eab698
SUSP_LNX_Reverse_Shell_Indicator_PowerShell_Jun21_1
8
d2a461abd0d4d1ddedc20fab5b022f17f5f223ced27de479716108f3c5eab698

YARA Rules Per Category

This list shows the number of YARA rules in the subscribable categories (categories overlap as a rule can be in 'n' categories)

Tag
Count
Malware
7624
Threat Hunting (not subscribable, only in THOR scanner)
5906
APT
5061
Hacktools
4861
Webshells
2402
Exploits
733

Newest Sigma Rules

This table shows the newest additions to the Sigma rule set

Rule
Description
Date
Ref
Info
HH.EXE CHM Decompilation With Non-CHM File Extension
Detects execution of hh.exe with the -decompile (-d) flag where no .chm extension is present in the command line. Threat actors disguise CHM files with alternative extensions (e.g. .doc, .pdf) to evade detection, then pass them to hh.exe for decompilation and payload extraction.
08.05.2026
HH.EXE CHM File Decompilation
Detects execution of hh.exe with the -decompile (-d) flag to extract contents of a CHM file. Threat actors abuse this technique to drop and execute malicious payloads embedded in CHM files.
08.05.2026
Net User Logon Time Restriction and Account Lockout
Detects usage of net user command to set logon time restrictions and disable accounts, a technique used by wipers to prevent user logins and lock out accounts, hindering recovery efforts.
04.05.2026
Network Interface Disabled Via Netsh
Detects netsh being used to disable a network interface. Threat actors abuse this to cut off network connectivity and prevent remote recovery or intervention during destructive attacks.
04.05.2026
Winlogon CachedLogonsCount Registry Manipulation Via CLI
Detects command-line manipulation of the CachedLogonsCount registry value under the Winlogon key through commandline. This value controls how many domain credential sets Windows caches locally. Setting it to zero disables caching entirely, forcing direct domain controller authentication. Threat actors may abuse this to prevent offline authentication or to hinder forensic credential recovery post-compromise.
04.05.2026
Robocopy Mirror Directory Wipe
Detects robocopy invoked with /MIR and /B flags, a technique commonly abused by wipers to overwrite entire directory trees by mirroring an empty source folder in backup mode, permanently destroying all file contents.
04.05.2026
Diskpart Volume Clean All Execution
Detects the execution of diskpart's "clean all" command, which permanently destroys all data on a disk volume by overwriting every sector with zeros. Threat actors abuse this for data destruction and wiper attacks.
04.05.2026
Winlogon CachedLogonsCount Registry Value Set To Zero
Detects registry set events where the CachedLogonsCount value under the Winlogon key is set to zero. This disables Windows cached domain credentials, forcing direct domain controller authentication. Threat actors may abuse this to prevent offline authentication or to hinder forensic credential recovery post-compromise.
04.05.2026
Free Disk Space Enumeration Via Fsutil
Detects the use of fsutil to enumerate free disk space on a volume. Threat actors may abuse this to determine available space before carrying out further actions such as data destruction or exfiltration.
04.05.2026
Large File Creation Via Fsutil
Detects fsutil being used to create a new file with a suspiciously large size. Threat actors abuse this technique to fill all available disk space, exhausting the filesystem and preventing the OS from writing logs, recovery artifacts, or any new data.
04.05.2026
Kubernetes Potential Enumeration Activity
Detects potential Kubernetes enumeration or attack activity via the audit log. This includes the execution of common shells, utilities, or specialized tools like 'Rakkess' (access_matrix) and 'TruffleHog' via Kubernetes API requests. Attackers use these methods to perform reconnaissance (enumeration), secret harvesting, or execute code (exec) within a cluster.
28.04.2026
Google Workspace Out Of Domain Email Forwarding
Detects automatic email forwarding to external domains in Google Workspace, which may indicate data leakage or misuse.
28.04.2026
Google Workspace Government Attack Warning
Detects a login attempt in Google Workspace flagged as a potential attack by a government-backed threat actor
28.04.2026
Suspicious Login Activity Classified By Google
Detects Google Workspace login activity that's classified as suspicious by Google.
28.04.2026
Cisco Dot1x Disabled
Detects the manual disablement of IEEE 802.1X (dot1x) on a Cisco network device interface. Disabling dot1x bypasses Network Access Control (NAC) mechanisms, potentially allowing unauthorized devices to gain access to the internal network. This activity is a common technique used by attackers or malicious insiders to establish persistence or perform lateral movement via rogue devices.
28.04.2026
Potential Exploitation of CVE-2025-5054 or CVE-2025-4598
Detects attempts of an attacker to enable core dumps for set-user-ID (SUID) processes by modifying the system file /proc/sys/fs/suid_dumpable, typically by setting its value to 1 or 2. Enabling this feature allows memory dumps (core dumps) of SUID processes, which usually run with elevated privileges. These dumps may contain sensitive information such as passwords, cryptographic keys or other secrets. CVE-2025-5054: Information leak via core dumps from SUID binaries using apport. CVE-2025-4598: Information disclosure in systemd-coredump due to insecure handling of SUID process memory dumps.
28.04.2026
Potential CVE-2026-33829 Exploitation - Windows Snipping Tool Remote File Path URI
Detects potential exploitation of CVE-2026-33829, a vulnerability in the Windows Snipping Tool URI handler (ms-screensketch:). An attacker can abuse the 'filePath' parameter to supply a UNC path or HTTP URL, causing SnippingTool.exe to initiate a connection to a remote resource. When a UNC path is used (e.g. \\attacker.com\share), this triggers an outbound NTLM authentication attempt, allowing the attacker to capture or relay the victim's Net-NTLMv2 hash. HTTP-based paths may result in remote file loading or server-side request forgery (SSRF)-style access. The URI can be delivered via a malicious hyperlink, phishing email, or web page.
28.04.2026
Sensitive File Dump Via Print.EXE
Detects the abuse of the Print.exe utility for credential harvesting which involves using Print.Exe to copy sensitive files such as ntds.dit, SAM, SECURITY, or SYSTEM from the Windows directory in order to extract credentials, locally or remotely.
28.04.2026
Service Startup Type Change Via Wmic.EXE
Detects changes to service startup type to 'disabled' or 'manual' using the WMIC command-line utility.
27.04.2026
Suspicious Task Scheduler XML Pattern Related with AtExec
Detects creation of scheduled tasks with XML patterns commonly associated with Atexec, a component of the NetExec tool that allows execution of commands via scheduled tasks for persistence and privilege escalation.
27.04.2026
Suspicious Certificate Request Pattern via CertReq
Detects suspicious certificate request patterns that may indicate abuse of certreq.exe for privilege escalation or lateral movement.
27.04.2026
Indirect Command Execution via SFTP ProxyCommand
Detects the use of SFTP.exe to execute commands indirectly via ProxyCommand parameter. Threat actors were seen leveraging this legitimate Windows binary to bypass security controls and execute arbitrary commands while evading detection.
27.04.2026
PUA - Memory Dump Mount Via MemProcFS
Detects execution of MemProcFS a memory forensics tool with the '-device' parameter. MemProcFS mounts physical memory as a virtual file system, allowing direct access to process memory and system structures. Threat actors were seen abusing this utility to mount memory dumps and then extract sensitive information from processes like LSASS or extract registry hives to obtain credentials, LSA secrets, SAM data, and cached domain credentials. MemProcFS usage that is not part of authorized forensic analysis should be treated as suspicious and warrants further investigation.
27.04.2026
RedSun - Conhost.exe Spawned by TieringEngineService.exe
Detects two stages of the RedSun post-exploitation process chain that deliver a SYSTEM-level shell to the attacker's interactive session. Observed process chain services.exe → TieringEngineService.exe → conhost.exe (SYSTEM, CommandLine: bare path, no arguments) → cmd.exe / shell (SYSTEM, TerminalSessionId = attacker's session) Stage 1 — TieringEngineService.exe spawns argument-less conhost.exe: After winning the oplock + Cloud Files mount point race, the malicious TieringEngineService.exe (RedSun.exe copied to System32, started via CoCreateInstance / services.exe) detects it is NT AUTHORITY\SYSTEM and calls LaunchConsoleInSessionId(). This opens \\.\pipe\REDSUN, reads the attacker's session ID, duplicates the SYSTEM token, re-stamps it with that session ID via SetTokenInformation(TokenSessionId), then calls CreateProcessAsUser to spawn conhost.exe with no arguments. Stage 2 — Shell spawned from rogue conhost.exe (EDR sources with GrandParentImage): The rogue SYSTEM conhost.exe spawns a shell (cmd.exe, PowerShell, etc.) as SYSTEM in the attacker's interactive session. On EDR sources that expose GrandParentImage, the full three-level chain (TieringEngineService.exe → conhost.exe → shell) can be matched directly. The legitimate TieringEngineService.exe is a headless COM server that is unlikely to spawn conhost.exe under normal conditions.
17.04.2026
RedSun - TieringEngineService.exe Detected as EICAR Test File
Detects Windows Defender (EventID 1119 - Remediation Action Failed) flagging TieringEngineService.exe dropped in a characteristic RS-{GUID} temporary directory, or the RedSun.exe process itself being present. This covers the staging pattern used by RedSun, a Cloud Files API and opportunistic lock (oplock) based AV bypass/privilege escalation tool. RedSun works as follows: 1. Registers a Cloud Files sync root and creates a Cloud Files placeholder for TieringEngineService.exe under %TEMP%\RS-{GUID}\ 2. The placeholder file carries EICAR test file content (Virus:DOS/EICAR_Test_File) to reliably trigger a Defender scan and remediation attempt 3. Requests a batch oplock (FSCTL_REQUEST_BATCH_OPLOCK) on the placeholder file 4. When Defender attempts to scan/quarantine the file, the oplock triggers - holding the file open 5. During the oplock break window, RedSun swaps the mount point (junction) to redirect \\?\C:\Windows\System32 to the attacker-controlled temp path 6. This races the AV/OS into executing the malicious TieringEngineService.exe with elevated privileges
17.04.2026
RedSun - TieringEngineService.exe Staged in RS-Prefixed Temp Dir
Detects the creation of a file named TieringEngineService.exe inside a directory whose path contains the RS- prefix characteristic of RedSun's staging directory (e.g. %TEMP%\RS-{GUID}\TieringEngineService.exe). RedSun registers a Cloud Files sync root under this RS-prefixed path and drops a masqueraded placeholder there as part of its oplock-based AV bypass and privilege escalation chain. The RS-{GUID} directory name is generated by RedSun itself and has no legitimate system usage, making the combination of this path prefix and the TieringEngineService.exe filename a highly specific indicator of RedSun activity.
17.04.2026
RedSun - Named Pipe Created
Detects the creation of a named pipe with the hardcoded name "REDSUN". The RedSun exploit tool uses a pipe with this name for synchronisation and command communication between its components during the Cloud Files API + oplock-based AV bypass and privilege escalation chain. RedSun creates the pipe as \\??\pipe\REDSUN. The pipe server listens for the token-duplicated elevated process to connect and respond, completing the privilege escalation from user to SYSTEM. Presence of this pipe name indicates active or recent RedSun execution.
17.04.2026
Potential C2 via Steam Community Page
Detects suspicious DNS queries to steamcommunity.com that may indicate using the Steam Community page to extract domain or IP address fronting for command-and-control (C2) communication. This technique has been observed in various malware families, including CastleRAT, lummas, and others.
15.04.2026
Potential Rogue Virtual Machine Execution via VMX
Detects potential rogue virtual machine execution via direct vmx binary execution with -x argument, which bypasses vCenter visibility and registration workflows. This technique may be used by adversaries to maintain persistence within a virtualized environment.
09.04.2026
Credential Dumping via Volatility Framework
Detects potential credential dumping activities using the Volatility memory forensics framework
09.04.2026

YARA/SIGMA Rule Count

Rule Type
Community Feed
Nextron Private Feed
Yara
2823
21271
Sigma
3589
999

Sigma Rules Per Category (Community)

Type
Count
windows / process_creation
1350
windows / registry_set
219
windows / file_event
209
windows / ps_script
166
windows / security
160
linux / process_creation
139
windows / image_load
114
webserver
82
windows / system
74
macos / process_creation
69
aws / cloudtrail
55
proxy
54
linux / auditd
53
windows / network_connection
53
azure / activitylogs
42
windows / registry_event
40
azure / auditlogs
38
windows / ps_module
33
windows / application
31
windows / dns_query
27
windows / process_access
25
azure / signinlogs
24
opencanary / application
24
okta / okta
22
azure / riskdetection
19
windows / pipe_created
19
windows / windefend
17
rpc_firewall / application
17
linux
16
gcp / gcp.audit
16
github / audit
15
linux / file_event
15
bitbucket / audit
14
windows / file_delete
13
m365 / threat_management
13
cisco / aaa
13
windows / create_remote_thread
12
dns
10
windows / driver_load
10
windows / registry_delete
10
kubernetes / application / audit
10
windows / codeintegrity-operational
10
windows / appxdeployment-server
9
windows / create_stream_hash
9
windows / ps_classic_start
9
windows / msexchange-management
8
windows / firewall-as
8
antivirus
7
fortigate / event
7
azure / pim
7
windows / file_access
7
windows / bits-client
7
gcp / google_workspace.admin
7
zeek / smb_files
7
kubernetes / audit
6
windows / dns-client
6
jvm / application
5
zeek / dns
5
linux / network_connection
5
zeek / http
5
windows / iis-configuration
4
zeek / dce_rpc
4
m365 / audit
4
macos / file_event
4
windows / sysmon
4
windows / taskscheduler
4
windows / powershell-classic
3
windows / ntlm
3
windows / registry_add
3
linux / sshd
3
gcp / google_workspace.login
3
windows / wmi_event
3
onelogin / onelogin.events
2
firewall
2
windows / security-mitigations
2
linux / syslog
2
spring / application
2
windows / dns-server
2
apache
2
linux / sudo
1
cisco / duo
1
nginx
1
windows / dns-server-analytic
1
cisco / ldp
1
windows / ldap
1
windows / wmi
1
windows / ps_classic_provider_start
1
windows / printservice-admin
1
database
1
cisco / bgp
1
windows / lsa-server
1
windows / printservice-operational
1
linux / guacamole
1
django / application
1
linux / auth
1
linux / clamav
1
windows / appmodel-runtime
1
fortios / sslvpnd
1
huawei / bgp
1
windows / applocker
1
windows / process_tampering
1
cisco / syslog
1
linux / cron
1
juniper / bgp
1
windows / appxpackaging-om
1
windows / openssh
1
windows / smbclient-connectivity
1
windows / smbserver-connectivity
1
windows / file_change
1
windows / raw_access_thread
1
paloalto / file_event / globalprotect
1
linux / vsftpd
1
zeek / x509
1
windows / capi2
1
nodejs / application
1
paloalto / appliance / globalprotect
1
windows / certificateservicesclient-lifecycle-system
1
windows / microsoft-servicebus-client
1
python / application
1
windows / shell-core
1
windows / file_executable_detected
1
windows / diagnosis-scripted
1
windows / smbclient-security
1
windows / file_rename
1
windows / sysmon_status
1
ruby_on_rails / application
1
m365 / exchange
1
zeek / rdp
1
windows / sysmon_error
1
m365 / threat_detection
1
zeek / kerberos
1
windows / terminalservices-localsessionmanager
1
velocity / application
1
windows / driver-framework
1
sql / application
1
windows
1

Sigma Rules Per Category (Nextron Private Feed)

Type
Count
windows / process_creation
492
windows / registry_set
87
windows / ps_script
85
linux / process_creation
51
windows / file_event
47
windows / image_load
46
windows / security
29
windows / wmi
29
windows / system
13
proxy
12
windows / network_connection
8
windows / registry_event
8
windows / kernel-event-tracing
6
windows / ntfs
5
windows / ps_module
5
windows / dns_query
5
windows / sense
4
windows / pipe_created
4
windows / taskscheduler
4
windows / create_remote_thread
4
windows / registry_delete
4
dns
3
windows / ps_classic_script
3
webserver
3
windows / application-experience
3
windows / vhd
3
windows / hyper-v-worker
3
windows / driver_load
3
windows / file_access
2
windows / file_delete
2
windows / kernel-shimengine
2
linux / file_event
2
macos / process_creation
2
windows / smbclient-security
2
windows / process_access
2
windows / windefend
2
windows / process-creation
2
windows / codeintegrity-operational
2
windows / bits-client
2
windows / firewall-as
1
windows / registry-setinformation
1
windows / file_rename
1
linux / file_delete
1
windows / amsi
1
windows / audit-cve
1
windows / registry_add
1
windows / application
1

Tenable Nessus

Requirement: Privileged Scan

  • YARA Scanning with Nessus works only when scanning with credentials (privileged scan)
Tutorial: https://docs.tenable.com/nessus/Content/CredentialedChecksOnWindows.htm

YARA Scanning with Nessus

  • You can only upload a single .yar file
  • Filesystem scan has to be activated
  • You have to define the target locations
  • The Nessus plugin ID will be 91990
  • Only files with the following extensions can be scanned: .application, .asp, .aspx, .bat, .chm, .class, .cmd, .com, .cp, .csh, .dl, .doc, .docx, .drv, .exe, .gadget, .hta, .inf, .ins, .inx, .isu, .jar, .job, .jpeg, .jpg, .js, .jse, .jse, .jsp, .lnk, .msc, .msi, .msp, .mst, .paf, .pdf, .php, .pif, .ppt, .pptx, .ps1, .ps1xm, .ps2, .ps2xm, .psc1, .psc2, .reg, .rgs, .scf, .scr, .sct, .shb, .shs, .swf, .sys, .u3p, .vb, .vbe, .vbs, .vbscript, .ws, .wsf, .xls, .xls
Tutorial: https://de.tenable.com/blog/threat-hunting-with-yara-and-nessus

Carbon Black

Tutorial: https://github.com/carbonblack/cb-yara-connector

FireEye EX

Tutorial: https://www.fireeye.com/blog/products-and-services/2018/12/detect-and-block-email-threats-with-custom-yara-rules.html