Detection rules › Sigma

PUA - TruffleHog Execution

Severity
medium
Author
Swachchhanda Shrawan Poudel (Nextron Systems)
Source
upstream

Detects execution of TruffleHog, a tool used to search for secrets in different platforms like Git, Jira, Slack, SharePoint, etc. that could be used maliciously. While it is a legitimate tool, intended for use in CI pipelines and security assessments, It was observed in the Shai-Hulud malware campaign targeting npm packages to steal sensitive information.

MITRE ATT&CK coverage

TacticTechniques
Credential AccessT1552.001 Unsecured Credentials: Credentials In Files
DiscoveryT1083 File and Directory Discovery

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation
Security-Auditing4688A new process has been created.

Stages and Predicates

Stage 1: selection_img

Image|endswith: '\trufflehog.exe'

Stage 2: all of selection_cli_platform

or:
CommandLine|contains: ' Confluence '
CommandLine|contains: ' Git '
CommandLine|contains: ' GitHub '
CommandLine|contains: ' Jira '
CommandLine|contains: ' SharePoint '
CommandLine|contains: ' Slack '
CommandLine|contains: ' docker --image '
CommandLine|contains: ' gcs '
CommandLine|contains: ' s3 '

Stage 3: all of selection_cli_verified

CommandLine|contains: ' --results=verified'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
CommandLinematch
  • --results=verified
  • Confluence
  • Git
  • GitHub
  • Jira
  • SharePoint
  • Slack
  • docker --image
  • gcs
  • s3
Imageends_with
  • \trufflehog.exe