Grixba Malware Reconnaissance Activity

Rule Info

Name
Grixba Malware Reconnaissance Activity
Author
yxinmiracle, Swachchhanda Shrawan Poudel (Nextron Systems)
Description
Detects execution of the Grixba reconnaissance tool based on suspicious command-line parameter combinations. This tool is used by the Play ransomware group for network enumeration, data gathering, and event log clearing.
Date
2025-11-26 00:00:00
Modified
None
Id
af688c76-4ce4-4309-bfdd-e896f01acf27
Tags
attack.reconnaissance attack.t1595.001 attack.discovery attack.t1046 detection.emerging-threats
Type
Community Rule

Rule History

Author
Title
Date
Commit
YxinMiracle
Merge PR #5707 from @YxinMiracle - Add `Grixba Malware Reconnaissance Activity`
2025-11-28