
Rule Info
Name
SUSP_Monitoring_Procs_List_Sep22_1
Minimum Yara
1.7
Date
2022-09-29
Description
Detects strings used in malware to detect several monitoring processes of security tools
Author
Florian Roth
Rule Hash
89dc931d8c4583c5a9c92b80447719ab
Tags
['SUSP']
Score
65
Required Modules
[]
Antivirus Verdicts
Rating
Number of Samples
Malicious (>= 10 engines)
3
Suspicious (< 10 engines)
23
Clean (0 engines)
14
Rule Matches
Hash
Timestamp
Total
Positives
VT