Techniques
Sample rules
Potential Homoglyph Attack Using Lookalike Characters in Filename
- source: sigma
- technicques:
- t1036
- t1036.003
Description
Detects the presence of unicode characters which are homoglyphs, or identical in appearance, to ASCII letter characters. This is used as an obfuscation and masquerading techniques. Only “perfect” homoglyphs are included; these are characters that are indistinguishable from ASCII characters and thus may make excellent candidates for homoglyph attack characters.
Detection logic
condition: 1 of selection_*
selection_lower:
TargetFilename|contains:
- "\u0430"
- "\u0435"
- "\u043E"
- "\u0440"
- "\u0441"
- "\u0445"
- "\u0455"
- "\u0456"
- "\u04CF"
- "\u0458"
- "\u04BB"
- "\u0501"
- "\u051B"
- "\u051D"
- "\u03BF"
selection_upper:
TargetFilename|contains:
- "\u0410"
- "\u0412"
- "\u0415"
- "\u041A"
- "\u041C"
- "\u041D"
- "\u041E"
- "\u0420"
- "\u0421"
- "\u0422"
- "\u0425"
- "\u0405"
- "\u0406"
- "\u0408"
- "\u04AE"
- "\u04C0"
- "\u050C"
- "\u051A"
- "\u051C"
- "\u0391"
- "\u0392"
- "\u0395"
- "\u0396"
- "\u0397"
- "\u0399"
- "\u039A"
- "\u039C"
- "\u039D"
- "\u039F"
- "\u03A1"
- "\u03A4"
- "\u03A5"
- "\u03A7"