Detection rules › Kusto Query Language

Zinc Actor IOCs files - October 2022

Source
upstream

'Identifies a match across filename and commandline IOC's related to an actor tracked by Microsoft as Zinc. Reference: https://www.microsoft.com/security/blog/2022/09/29/zinc-weaponizing-open-source-software/'

MITRE ATT&CK coverage

TacticTechniques
PersistenceT1546 Event Triggered Execution
Privilege EscalationT1546 Event Triggered Execution

Event coverage

ProviderEvent IDTitle
Sysmon3Network connection
Security-Auditing5156The Windows Filtering Platform has permitted a connection.
Defender-DeviceNetworkEvents9004000Network activity (any)

Stages and Predicates

Stage 1: source

<union>

Stage 2: union

union of 6 branches

Stage 3: extend

Stage 4: extend