
Rule Info
Tags
attack.defense_evasion DEMO attack.t1218.008
Name
Potentially Suspicious DLL Registered Via Odbcconf.EXE
Id
ba4cfc11-d0fa-4d94-bf20-7c332c412e76
Date
2023-05-22 00:00:00
Modified
None
Description
Detects execution of "odbcconf" with the "REGSVR" action where the DLL in question doesn't contain a ".dll" extension. Which is often used as a method to evade defenses.
Author
Nasreddine Bencherchali (Nextron Systems)
Type
Community Rule
Link to Public Repo
Rule History
Title
Author
Commit
Date