Detection rules › Sigma
HackTool - GMER Rootkit Detector and Remover Execution
Detects the execution GMER tool based on image and hash fields.
Event coverage
| Provider | Event ID | Title |
|---|---|---|
| Sysmon | 1 | Process creation |
Stages and Predicates
Stage 1: 1 of selection_img
Image|endswith: '\gmer.exe'
Stage 2: 1 of selection_sysmon_hash
or:
Hashes|contains: 'MD5=E9DC058440D321AA17D0600B3CA0AB04'
Hashes|contains: 'SHA1=539C228B6B332F5AA523E5CE358C16647D8BBE57'
Hashes|contains: 'SHA256=E8A3E804A96C716A3E9B69195DB6FFB0D33E2433AF871E4D4E1EAB3097237173'
Indicators
Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.
| Field | Kind | Values |
|---|---|---|
Hashes | match |
|
Image | ends_with |
|