SNAKE Malware Kernel Driver File Indicator

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects SNAKE malware kernel driver file indicator

Severity

Critical

Rule Requirement

Criteria

Action1: actionname = "File Created or Modified" AND FILENAME = "C:\Windows\System32\Com\Comadmin.dat" OR OBJECTNAME = "C:\Windows\System32\Com\Comadmin.dat" select Action1.HOSTNAME,Action1.MESSAGE,Action1.USERNAME,Action1.DOMAIN,Action1.OBJECTNAME,Action1.FILENAME,Action1.PROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Nasreddine Bencherchali (Nextron Systems)