Detection rules › Sigma

HackTool - GMER Rootkit Detector and Remover Execution

Severity
high
Author
Nasreddine Bencherchali (Nextron Systems)
Source
upstream

Detects the execution GMER tool based on image and hash fields.

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation

Stages and Predicates

Stage 1: 1 of selection_img

Image|endswith: '\gmer.exe'

Stage 2: 1 of selection_sysmon_hash

or:
Hashes|contains: 'MD5=E9DC058440D321AA17D0600B3CA0AB04'
Hashes|contains: 'SHA1=539C228B6B332F5AA523E5CE358C16647D8BBE57'
Hashes|contains: 'SHA256=E8A3E804A96C716A3E9B69195DB6FFB0D33E2433AF871E4D4E1EAB3097237173'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
Hashesmatch
  • MD5=E9DC058440D321AA17D0600B3CA0AB04
  • SHA1=539C228B6B332F5AA523E5CE358C16647D8BBE57
  • SHA256=E8A3E804A96C716A3E9B69195DB6FFB0D33E2433AF871E4D4E1EAB3097237173
Imageends_with
  • \gmer.exe corpus 2 (sigma 2)