sigma |
win_invoke_obfuscation_clip_services_security.yml |
title: Invoke-Obfuscation CLIP+ Launcher |
DRL 1.0 |
sigma |
win_invoke_obfuscation_stdin_services_security.yml |
title: Invoke-Obfuscation STDIN+ Launcher |
DRL 1.0 |
sigma |
win_invoke_obfuscation_var_services_security.yml |
title: Invoke-Obfuscation VAR+ Launcher |
DRL 1.0 |
sigma |
win_invoke_obfuscation_via_rundll_services_security.yml |
title: Invoke-Obfuscation RUNDLL LAUNCHER |
DRL 1.0 |
sigma |
win_invoke_obfuscation_via_rundll_services_security.yml |
description: Detects Obfuscated Powershell via RUNDLL LAUNCHER |
DRL 1.0 |
sigma |
win_invoke_obfuscation_via_var_services_security.yml |
title: Invoke-Obfuscation VAR++ LAUNCHER OBFUSCATION |
DRL 1.0 |
sigma |
win_invoke_obfuscation_via_var_services_security.yml |
description: Detects Obfuscated Powershell via VAR++ LAUNCHER |
DRL 1.0 |
sigma |
win_invoke_obfuscation_clip_services.yml |
title: Invoke-Obfuscation CLIP+ Launcher |
DRL 1.0 |
sigma |
win_invoke_obfuscation_stdin_services.yml |
title: Invoke-Obfuscation STDIN+ Launcher |
DRL 1.0 |
sigma |
win_invoke_obfuscation_var_services.yml |
title: Invoke-Obfuscation VAR+ Launcher |
DRL 1.0 |
sigma |
win_invoke_obfuscation_via_rundll_services.yml |
title: Invoke-Obfuscation RUNDLL LAUNCHER |
DRL 1.0 |
sigma |
win_invoke_obfuscation_via_rundll_services.yml |
description: Detects Obfuscated Powershell via RUNDLL LAUNCHER |
DRL 1.0 |
sigma |
win_invoke_obfuscation_via_var_services.yml |
title: Invoke-Obfuscation VAR++ LAUNCHER OBFUSCATION |
DRL 1.0 |
sigma |
win_invoke_obfuscation_via_var_services.yml |
description: Detects Obfuscated Powershell via VAR++ LAUNCHER |
DRL 1.0 |
sigma |
posh_pm_invoke_obfuscation_clip.yml |
title: Invoke-Obfuscation CLIP+ Launcher |
DRL 1.0 |
sigma |
posh_pm_invoke_obfuscation_stdin.yml |
title: Invoke-Obfuscation STDIN+ Launcher |
DRL 1.0 |
sigma |
posh_pm_invoke_obfuscation_var.yml |
title: Invoke-Obfuscation VAR+ Launcher |
DRL 1.0 |
sigma |
posh_pm_invoke_obfuscation_via_rundll.yml |
title: Invoke-Obfuscation RUNDLL LAUNCHER |
DRL 1.0 |
sigma |
posh_pm_invoke_obfuscation_via_rundll.yml |
description: Detects Obfuscated Powershell via RUNDLL LAUNCHER |
DRL 1.0 |
sigma |
posh_pm_invoke_obfuscation_via_var.yml |
title: Invoke-Obfuscation VAR++ LAUNCHER OBFUSCATION |
DRL 1.0 |
sigma |
posh_pm_invoke_obfuscation_via_var.yml |
description: Detects Obfuscated Powershell via VAR++ LAUNCHER |
DRL 1.0 |
sigma |
posh_ps_invoke_obfuscation_clip.yml |
title: Invoke-Obfuscation CLIP+ Launcher |
DRL 1.0 |
sigma |
posh_ps_invoke_obfuscation_stdin.yml |
title: Invoke-Obfuscation STDIN+ Launcher |
DRL 1.0 |
sigma |
posh_ps_invoke_obfuscation_var.yml |
title: Invoke-Obfuscation VAR+ Launcher |
DRL 1.0 |
sigma |
posh_ps_invoke_obfuscation_via_rundll.yml |
title: Invoke-Obfuscation RUNDLL LAUNCHER |
DRL 1.0 |
sigma |
posh_ps_invoke_obfuscation_via_rundll.yml |
description: Detects Obfuscated Powershell via RUNDLL LAUNCHER |
DRL 1.0 |
sigma |
posh_ps_invoke_obfuscation_via_var.yml |
title: Invoke-Obfuscation VAR++ LAUNCHER OBFUSCATION |
DRL 1.0 |
sigma |
posh_ps_invoke_obfuscation_via_var.yml |
description: Detects Obfuscated Powershell via VAR++ LAUNCHER |
DRL 1.0 |
sigma |
proc_creation_win_invoke_obfuscation_clip.yml |
title: Invoke-Obfuscation CLIP+ Launcher |
DRL 1.0 |
sigma |
proc_creation_win_invoke_obfuscation_stdin.yml |
title: Invoke-Obfuscation STDIN+ Launcher |
DRL 1.0 |
sigma |
proc_creation_win_invoke_obfuscation_var.yml |
title: Invoke-Obfuscation VAR+ Launcher |
DRL 1.0 |
sigma |
proc_creation_win_invoke_obfuscation_via_rundll.yml |
title: Invoke-Obfuscation RUNDLL LAUNCHER |
DRL 1.0 |
sigma |
proc_creation_win_invoke_obfuscation_via_rundll.yml |
description: Detects Obfuscated Powershell via RUNDLL LAUNCHER |
DRL 1.0 |
sigma |
proc_creation_win_invoke_obfuscation_via_var.yml |
title: Invoke-Obfuscation VAR++ LAUNCHER OBFUSCATION |
DRL 1.0 |
sigma |
proc_creation_win_invoke_obfuscation_via_var.yml |
description: Detects Obfuscated Powershell via VAR++ LAUNCHER |
DRL 1.0 |
sigma |
proc_creation_win_susp_covenant.yml |
title: Covenant Launcher Indicators |
DRL 1.0 |
sigma |
driver_load_invoke_obfuscation_clip+_services.yml |
title: Invoke-Obfuscation CLIP+ Launcher |
DRL 1.0 |
sigma |
driver_load_invoke_obfuscation_stdin+_services.yml |
title: Invoke-Obfuscation STDIN+ Launcher |
DRL 1.0 |
sigma |
driver_load_invoke_obfuscation_var+_services.yml |
title: Invoke-Obfuscation VAR+ Launcher |
DRL 1.0 |
sigma |
driver_load_invoke_obfuscation_via_rundll_services.yml |
title: Invoke-Obfuscation RUNDLL LAUNCHER |
DRL 1.0 |
sigma |
driver_load_invoke_obfuscation_via_rundll_services.yml |
description: Detects Obfuscated Powershell via RUNDLL LAUNCHER |
DRL 1.0 |
sigma |
driver_load_invoke_obfuscation_via_var++_services.yml |
title: Invoke-Obfuscation VAR++ LAUNCHER OBFUSCATION |
DRL 1.0 |
sigma |
driver_load_invoke_obfuscation_via_var++_services.yml |
description: Detects Obfuscated Powershell via VAR++ LAUNCHER |
DRL 1.0 |
malware-ioc |
kryptocibule |
.Main launcher ( armsvc.exe) |
© ESET 2014-2018 |
malware-ioc |
misp-ramsay.json |
"comment": "Installer Launcher", |
© ESET 2014-2018 |
malware-ioc |
winnti_group |
==== VMProtected launcher |
© ESET 2014-2018 |
atomic-red-team |
T1555.003.md |
if (((Test-Path “$env:LOCALAPPDATA\Programs\Opera\launcher.exe”) -Or (Test-Path “C:\Program Files\Opera\launcher.exe”) -Or (Test-Path “C:\Program Files (x86)\Opera\launcher.exe”))) {exit 0} else {exit 1} |
MIT License. © 2018 Red Canary |
signature-base |
apt_apt30_backspace.yar |
$s0 = “Launcher.EXE” fullword wide |
CC BY-NC 4.0 |
signature-base |
apt_cobaltstrike_evasive.yar |
description = “Detects CobaltStrike MZ header ReflectiveLoader launcher” |
CC BY-NC 4.0 |
signature-base |
apt_eqgrp_apr17.yar |
$s1 = “* Failed to get connection information. Aborting launcher!” fullword wide |
CC BY-NC 4.0 |
signature-base |
apt_op_wocao.yar |
description = “Process injector/launcher” |
CC BY-NC 4.0 |
signature-base |
spy_equation_fiveeyes.yar |
description = “Equation Group Malware - EoP package and malware launcher” |
CC BY-NC 4.0 |