mirror of
https://github.com/fleetdm/fleet
synced 2026-05-24 09:28:54 +00:00
add example query that checks a malware artifact (#2296)
This commit is contained in:
parent
746d02ebe0
commit
d3a2083188
1 changed files with 10 additions and 0 deletions
|
|
@ -496,3 +496,13 @@ spec:
|
|||
query: select case cnt when 0 then "NONE_INSTALLED" else "INSTALLED" end as "Malicious Python Packages",package_name,package_version from (select count(name) as cnt,nameas package_name,version as package_version,path as package_pathfrom python_packages where package_name in ('acqusition','apidev-coop','bzip','crypt','django-server','pwd','setup-tools','telnet','urlib3','urllib'));
|
||||
purpose: Informational
|
||||
contributors: alphabrevity
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: query
|
||||
spec:
|
||||
name: Check for artifacts of the Floxif trojan
|
||||
platforms: Windows
|
||||
description: See https://github.com/osquery/osquery/blob/b8085572ed1a58ff635683e5f2225cd49cd27bc1/packs/windows-attacks.conf#L4-L10
|
||||
query: select * from registry where path like 'HKEY_LOCAL_MACHINE\\SOFTWARE\\Piriform\\Agomo%';,
|
||||
purpose: Informational
|
||||
contributors: micheal-o
|
||||
|
|
|
|||
Loading…
Reference in a new issue