Detection rules › Sigma

HackTool - LocalPotato Execution

Severity
high
Author
Nasreddine Bencherchali (Nextron Systems)
Source
upstream

Detects the execution of the LocalPotato POC based on basic PE metadata information and default CLI examples

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation

Stages and Predicates

Stage 1: 1 of selection_img

Image|endswith: '\LocalPotato.exe'

Stage 2: 1 of selection_cli

CommandLine|contains: '-o Windows\'
CommandLine|contains: '.exe -i C:\'

Stage 3: 1 of selection_hash_plain

or:
Hashes|contains: 'IMPHASH=DD82066EFBA94D7556EF582F247C8BB5'
Hashes|contains: 'IMPHASH=E1742EE971D6549E8D4D81115F88F1FC'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
CommandLinematch
  • -o Windows\
  • .exe -i C:\
Hashesmatch
  • IMPHASH=DD82066EFBA94D7556EF582F247C8BB5
  • IMPHASH=E1742EE971D6549E8D4D81115F88F1FC
Imageends_with
  • \LocalPotato.exe corpus 2 (sigma 2)