使用 Virtual Machine Threat Detection

本頁說明如何查看及管理 VM 威脅偵測結果。此外,也會說明如何啟用或停用服務及其模組。

總覽

Virtual Machine Threat Detection 是 Security Command Center 的內建服務,適用於 Enterprise 和 Premium 方案。這項服務會掃描虛擬機器,偵測潛在的惡意應用程式,例如加密貨幣挖礦軟體、核心模式 Rootkit,以及在遭駭雲端環境中執行的惡意軟體。

VM 威脅偵測是 Security Command Center 威脅偵測套件的一部分,旨在輔助 Event Threat DetectionContainer Threat Detection 的現有功能。

詳情請參閱 VM 威脅偵測總覽

費用

註冊 Security Command Center 進階版後,使用 VM 威脅偵測功能不會產生額外費用。

事前準備

如要取得管理虛擬機器威脅偵測服務及其模組所需的權限,請要求管理員為您授予機構、資料夾或專案的安全中心管理管理員 (roles/securitycentermanagement.admin) 身分與存取權管理角色。如要進一步瞭解如何授予角色,請參閱「管理專案、資料夾和機構的存取權」。

您或許還可透過自訂角色或其他預先定義的角色取得必要權限。

測試 VM 威脅偵測

如要測試 VM Threat Detection 加密貨幣挖礦偵測功能,您可以在 VM 上執行加密貨幣挖礦應用程式。如需會觸發調查結果的二進位檔名稱和 YARA 規則清單,請參閱「軟體名稱和 YARA 規則」。如果安裝及測試挖礦應用程式,建議您只在獨立測試環境中執行應用程式,密切監控應用程式的使用情況,並在測試後徹底移除。

如要測試 VM Threat Detection 的惡意軟體偵測功能,您可以在 VM 上下載惡意軟體應用程式。如果下載惡意軟體,建議您在獨立測試環境中執行,並在測試後徹底移除。

在 Google Cloud 控制台中查看發現項目

如要在 Google Cloud 控制台中查看 VM 威脅偵測結果,請按照下列步驟操作:

  1. 在 Google Cloud 控制台中,前往 Security Command Center 的「發現項目」頁面。

    前往「發現項目」

  2. 選取 Google Cloud 專案或機構。
  3. 在「快速篩選器」部分的「來源顯示名稱」子部分中,選取「虛擬機器威脅偵測」。發現項目查詢結果會更新,只顯示來自這個來源的發現項目。
  4. 如要查看特定發現項目的詳細資料,請按一下「類別」欄中的發現項目名稱。 系統會開啟發現項目的詳細資料面板,並顯示「摘要」分頁。
  5. 在「摘要」分頁中,查看發現項目的詳細資料,包括偵測到的內容、受影響的資源,以及 (如有) 可採取哪些步驟來修正發現項目。
  6. 選用:如要查看調查結果的完整 JSON 定義,請按一下「JSON」JSON分頁。

如要進一步瞭解如何回應各項 VM 威脅偵測結果,請參閱「VM 威脅偵測回應」。

如需 VM 威脅偵測結果清單,請參閱「結果」一文。

嚴重性

系統會根據威脅分類的信心程度,為 VM 威脅偵測結果指派「高」、「中」和「低」嚴重程度。

合併偵測

如果系統在一天內偵測到多個類別的發現項目,就會發生合併偵測。這些發現可能是一或多個惡意應用程式所致。 舉例來說,單一應用程式可同時觸發 Execution: Cryptocurrency Mining YARA RuleExecution: Cryptocurrency Mining Hash Match 發現項目。不過,如果同一天內從單一來源偵測到多項威脅,系統會將這些威脅彙整為一項聯合偵測發現項目。如果之後發現更多威脅 (即使是相同的威脅),系統也會附加到新的發現項目。

如需合併偵測結果的範例,請參閱「範例發現格式」。

尋找格式範例

這些 JSON 輸出範例包含 VM 威脅偵測結果的常見欄位。每個範例只會顯示與發現項目類型相關的欄位,不會提供完整欄位清單

您可以透過 Security Command Center 控制台匯出發現項目,或透過 Security Command Center API 列出發現項目

如要查看範例結果,請展開下列一或多個節點。如要瞭解調查結果中每個欄位的資訊,請參閱 Finding

Defense Evasion: Rootkit

這個輸出範例顯示已知的核心模式 Rootkit 發現結果: Diamorphine。

{
  "findings": {
    "access": {},
    "assetDisplayName": "DISPLAY_NAME",
    "assetId": "organizations/ORGANIZATION_ID/assets/ASSET_ID",
    "canonicalName": "projects/PROJECT_NUMBER/sources/SOURCE_ID/findings/FINDING_ID",
    "category": "Defense Evasion: Rootkit",
    "createTime": "2023-01-12T00:39:33.007Z",
    "database": {},
    "eventTime": "2023-01-11T21:24:05.326Z",
    "exfiltration": {},
    "findingClass": "THREAT",
    "findingProviderId": "organizations/ORGANIZATION_ID/firstPartyFindingProviders/vmtd",
    "indicator": {},
    "kernelRootkit": {
      "name": "Diamorphine",
      "unexpected_kernel_code_pages": true,
      "unexpected_system_call_handler": true
    },
    "kubernetes": {},
    "mitreAttack": {
      "version": "9"
    },
    "mute": "UNDEFINED",
    "name": "organizations/ORGANIZATION_ID/sources/SOURCE_ID/findings/FINDING_ID",
    "parent": "organizations/ORGANIZATION_ID/sources/SOURCE_ID",
    "parentDisplayName": "Virtual Machine Threat Detection",
    "processes": [],
    "resourceName": "//compute.googleapis.com/projects/PROJECT_ID/zones/ZONE/instances/INSTANCE_ID",
    "severity": "HIGH",
    "sourceDisplayName": "Virtual Machine Threat Detection",
    "state": "ACTIVE",
    "vulnerability": {},
    "workflowState": "NEW"
  },
  "resource": {
    "name": "//compute.googleapis.com/projects/PROJECT_ID/zones/ZONE/instances/INSTANCE_ID",
    "display_name": "DISPLAY_NAME",
    "project_name": "//cloudresourcemanager.googleapis.com/projects/PROJECT_NUMBER",
    "project_display_name": "PROJECT_ID",
    "parent_name": "//cloudresourcemanager.googleapis.com/projects/PROJECT_NUMBER",
    "parent_display_name": "DISPLAY_NAME",
    "type": "google.compute.Instance",
    "folders": []
  },
  "sourceProperties": {}
}
      

Defense Evasion: Unexpected ftrace handler

  {
    "findings": {
      "access": {},
      "assetDisplayName": "DISPLAY_NAME",
      "assetId": "organizations/ORGANIZATION_ID/assets/ASSET_ID",
      "canonicalName": "projects/PROJECT_NUMBER/sources/SOURCE_ID/findings/FINDING_ID",
      "category": "Defense Evasion: Unexpected ftrace handler",
      "createTime": "2023-01-12T00:39:33.007Z",
      "database": {},
      "eventTime": "2023-01-11T21:24:05.326Z",
      "exfiltration": {},
      "findingClass": "THREAT",
      "findingProviderId": "organizations/ORGANIZATION_ID/firstPartyFindingProviders/vmtd",
      "indicator": {},
      "kernelRootkit": {},
      "kubernetes": {},
      "mitreAttack": {
        "version": "9"
      },
      "mute": "UNDEFINED",
      "name": "organizations/ORGANIZATION_ID/sources/SOURCE_ID/findings/FINDING_ID",
      "parent": "organizations/ORGANIZATION_ID/sources/SOURCE_ID",
      "parentDisplayName": "Virtual Machine Threat Detection",
      "processes": [],
      "resourceName": "//compute.googleapis.com/projects/PROJECT_ID/zones/ZONE/instances/INSTANCE_ID",
      "severity": "HIGH",
      "sourceDisplayName": "Virtual Machine Threat Detection",
      "state": "ACTIVE",
      "vulnerability": {},
      "workflowState": "NEW"
    },
    "resource": {
      "name": "//compute.googleapis.com/projects/PROJECT_ID/zones/ZONE/instances/INSTANCE_ID",
      "display_name": "DISPLAY_NAME",
      "project_name": "//cloudresourcemanager.googleapis.com/projects/PROJECT_NUMBER",
      "project_display_name": "PROJECT_ID",
      "parent_name": "//cloudresourcemanager.googleapis.com/projects/PROJECT_NUMBER",
      "parent_display_name": "DISPLAY_NAME",
      "type": "google.compute.Instance",
      "folders": []
    },
    "sourceProperties": {}
  }
      

Defense Evasion: Unexpected interrupt handler

  {
    "findings": {
      "access": {},
      "assetDisplayName": "DISPLAY_NAME",
      "assetId": "organizations/ORGANIZATION_ID/assets/ASSET_ID",
      "canonicalName": "projects/PROJECT_NUMBER/sources/SOURCE_ID/findings/FINDING_ID",
      "category": "Defense Evasion: Unexpected interrupt handler",
      "createTime": "2023-01-12T00:39:33.007Z",
      "database": {},
      "eventTime": "2023-01-11T21:24:05.326Z",
      "exfiltration": {},
      "findingClass": "THREAT",
      "findingProviderId": "organizations/ORGANIZATION_ID/firstPartyFindingProviders/vmtd",
      "indicator": {},
      "kernelRootkit": {},
      "kubernetes": {},
      "mitreAttack": {
        "version": "9"
      },
      "mute": "UNDEFINED",
      "name": "organizations/ORGANIZATION_ID/sources/SOURCE_ID/findings/FINDING_ID",
      "parent": "organizations/ORGANIZATION_ID/sources/SOURCE_ID",
      "parentDisplayName": "Virtual Machine Threat Detection",
      "processes": [],
      "resourceName": "//compute.googleapis.com/projects/PROJECT_ID/zones/ZONE/instances/INSTANCE_ID",
      "severity": "HIGH",
      "sourceDisplayName": "Virtual Machine Threat Detection",
      "state": "ACTIVE",
      "vulnerability": {},
      "workflowState": "NEW"
    },
    "resource": {
      "name": "//compute.googleapis.com/projects/PROJECT_ID/zones/ZONE/instances/INSTANCE_ID",
      "display_name": "DISPLAY_NAME",
      "project_name": "//cloudresourcemanager.googleapis.com/projects/PROJECT_NUMBER",
      "project_display_name": "PROJECT_ID",
      "parent_name": "//cloudresourcemanager.googleapis.com/projects/PROJECT_NUMBER",
      "parent_display_name": "DISPLAY_NAME",
      "type": "google.compute.Instance",
      "folders": []
    },
    "sourceProperties": {}
  }
      

Defense Evasion: Unexpected kernel modules

  {
    "findings": {
      "access": {},
      "assetDisplayName": "DISPLAY_NAME",
      "assetId": "organizations/ORGANIZATION_ID/assets/ASSET_ID",
      "canonicalName": "projects/PROJECT_NUMBER/sources/SOURCE_ID/findings/FINDING_ID",
      "category": "Defense Evasion: Unexpected kernel modules",
      "createTime": "2023-01-12T00:39:33.007Z",
      "database": {},
      "eventTime": "2023-01-11T21:24:05.326Z",
      "exfiltration": {},
      "findingClass": "THREAT",
      "findingProviderId": "organizations/ORGANIZATION_ID/firstPartyFindingProviders/vmtd",
      "indicator": {},
      "kernelRootkit": {},
      "kubernetes": {},
      "mitreAttack": {
        "version": "9"
      },
      "mute": "UNDEFINED",
      "name": "organizations/ORGANIZATION_ID/sources/SOURCE_ID/findings/FINDING_ID",
      "parent": "organizations/ORGANIZATION_ID/sources/SOURCE_ID",
      "parentDisplayName": "Virtual Machine Threat Detection",
      "processes": [],
      "resourceName": "//compute.googleapis.com/projects/PROJECT_ID/zones/ZONE/instances/INSTANCE_ID",
      "severity": "HIGH",
      "sourceDisplayName": "Virtual Machine Threat Detection",
      "state": "ACTIVE",
      "vulnerability": {},
      "workflowState": "NEW"
    },
    "resource": {
      "name": "//compute.googleapis.com/projects/PROJECT_ID/zones/ZONE/instances/INSTANCE_ID",
      "display_name": "DISPLAY_NAME",
      "project_name": "//cloudresourcemanager.googleapis.com/projects/PROJECT_NUMBER",
      "project_display_name": "PROJECT_ID",
      "parent_name": "//cloudresourcemanager.googleapis.com/projects/PROJECT_NUMBER",
      "parent_display_name": "DISPLAY_NAME",
      "type": "google.compute.Instance",
      "folders": []
    },
    "sourceProperties": {}
  }
      

Defense Evasion: Unexpected kernel read-only data modification

  {
    "findings": {
      "access": {},
      "assetDisplayName": "DISPLAY_NAME",
      "assetId": "organizations/ORGANIZATION_ID/assets/ASSET_ID",
      "canonicalName": "projects/PROJECT_NUMBER/sources/SOURCE_ID/findings/FINDING_ID",
      "category": "Defense Evasion: Unexpected kernel read-only data modification",
      "createTime": "2023-01-12T00:39:33.007Z",
      "database": {},
      "eventTime": "2023-01-11T21:24:05.326Z",
      "exfiltration": {},
      "findingClass": "THREAT",
      "findingProviderId": "organizations/ORGANIZATION_ID/firstPartyFindingProviders/vmtd",
      "indicator": {},
      "kernelRootkit": {},
      "kubernetes": {},
      "mitreAttack": {
        "version": "9"
      },
      "mute": "UNDEFINED",
      "name": "organizations/ORGANIZATION_ID/sources/SOURCE_ID/findings/FINDING_ID",
      "parent": "organizations/ORGANIZATION_ID/sources/SOURCE_ID",
      "parentDisplayName": "Virtual Machine Threat Detection",
      "processes": [],
      "resourceName": "//compute.googleapis.com/projects/PROJECT_ID/zones/ZONE/instances/INSTANCE_ID",
      "severity": "HIGH",
      "sourceDisplayName": "Virtual Machine Threat Detection",
      "state": "ACTIVE",
      "vulnerability": {},
      "workflowState": "NEW"
    },
    "resource": {
      "name": "//compute.googleapis.com/projects/PROJECT_ID/zones/ZONE/instances/INSTANCE_ID",
      "display_name": "DISPLAY_NAME",
      "project_name": "//cloudresourcemanager.googleapis.com/projects/PROJECT_NUMBER",
      "project_display_name": "PROJECT_ID",
      "parent_name": "//cloudresourcemanager.googleapis.com/projects/PROJECT_NUMBER",
      "parent_display_name": "DISPLAY_NAME",
      "type": "google.compute.Instance",
      "folders": []
    },
    "sourceProperties": {}
  }
      

Defense Evasion: Unexpected kprobe handler

  {
    "findings": {
      "access": {},
      "assetDisplayName": "DISPLAY_NAME",
      "assetId": "organizations/ORGANIZATION_ID/assets/ASSET_ID",
      "canonicalName": "projects/PROJECT_NUMBER/sources/SOURCE_ID/findings/FINDING_ID",
      "category": "Defense Evasion: Unexpected kprobe handler",
      "createTime": "2023-01-12T00:39:33.007Z",
      "database": {},
      "eventTime": "2023-01-11T21:24:05.326Z",
      "exfiltration": {},
      "findingClass": "THREAT",
      "findingProviderId": "organizations/ORGANIZATION_ID/firstPartyFindingProviders/vmtd",
      "indicator": {},
      "kernelRootkit": {},
      "kubernetes": {},
      "mitreAttack": {
        "version": "9"
      },
      "mute": "UNDEFINED",
      "name": "organizations/ORGANIZATION_ID/sources/SOURCE_ID/findings/FINDING_ID",
      "parent": "organizations/ORGANIZATION_ID/sources/SOURCE_ID",
      "parentDisplayName": "Virtual Machine Threat Detection",
      "processes": [],
      "resourceName": "//compute.googleapis.com/projects/PROJECT_ID/zones/ZONE/instances/INSTANCE_ID",
      "severity": "HIGH",
      "sourceDisplayName": "Virtual Machine Threat Detection",
      "state": "ACTIVE",
      "vulnerability": {},
      "workflowState": "NEW"
    },
    "resource": {
      "name": "//compute.googleapis.com/projects/PROJECT_ID/zones/ZONE/instances/INSTANCE_ID",
      "display_name": "DISPLAY_NAME",
      "project_name": "//cloudresourcemanager.googleapis.com/projects/PROJECT_NUMBER",
      "project_display_name": "PROJECT_ID",
      "parent_name": "//cloudresourcemanager.googleapis.com/projects/PROJECT_NUMBER",
      "parent_display_name": "DISPLAY_NAME",
      "type": "google.compute.Instance",
      "folders": []
    },
    "sourceProperties": {}
  }
      

Defense Evasion: Unexpected processes in runqueue

  {
    "findings": {
      "access": {},
      "assetDisplayName": "DISPLAY_NAME",
      "assetId": "organizations/ORGANIZATION_ID/assets/ASSET_ID",
      "canonicalName": "projects/PROJECT_NUMBER/sources/SOURCE_ID/findings/FINDING_ID",
      "category": "Defense Evasion: Unexpected processes in runqueue",
      "createTime": "2023-01-12T00:39:33.007Z",
      "database": {},
      "eventTime": "2023-01-11T21:24:05.326Z",
      "exfiltration": {},
      "findingClass": "THREAT",
      "findingProviderId": "organizations/ORGANIZATION_ID/firstPartyFindingProviders/vmtd",
      "indicator": {},
      "kernelRootkit": {},
      "kubernetes": {},
      "mitreAttack": {
        "version": "9"
      },
      "mute": "UNDEFINED",
      "name": "organizations/ORGANIZATION_ID/sources/SOURCE_ID/findings/FINDING_ID",
      "parent": "organizations/ORGANIZATION_ID/sources/SOURCE_ID",
      "parentDisplayName": "Virtual Machine Threat Detection",
      "processes": [],
      "resourceName": "//compute.googleapis.com/projects/PROJECT_ID/zones/ZONE/instances/INSTANCE_ID",
      "severity": "HIGH",
      "sourceDisplayName": "Virtual Machine Threat Detection",
      "state": "ACTIVE",
      "vulnerability": {},
      "workflowState": "NEW"
    },
    "resource": {
      "name": "//compute.googleapis.com/projects/PROJECT_ID/zones/ZONE/instances/INSTANCE_ID",
      "display_name": "DISPLAY_NAME",
      "project_name": "//cloudresourcemanager.googleapis.com/projects/PROJECT_NUMBER",
      "project_display_name": "PROJECT_ID",
      "parent_name": "//cloudresourcemanager.googleapis.com/projects/PROJECT_NUMBER",
      "parent_display_name": "DISPLAY_NAME",
      "type": "google.compute.Instance",
      "folders": []
    },
    "sourceProperties": {}
  }
      

Defense Evasion: Unexpected system call handler

  {
    "findings": {
      "access": {},
      "assetDisplayName": "DISPLAY_NAME",
      "assetId": "organizations/ORGANIZATION_ID/assets/ASSET_ID",
      "canonicalName": "projects/PROJECT_NUMBER/sources/SOURCE_ID/findings/FINDING_ID",
      "category": "Defense Evasion: Unexpected system call handler",
      "createTime": "2023-01-12T00:39:33.007Z",
      "database": {},
      "eventTime": "2023-01-11T21:24:05.326Z",
      "exfiltration": {},
      "findingClass": "THREAT",
      "findingProviderId": "organizations/ORGANIZATION_ID/firstPartyFindingProviders/vmtd",
      "indicator": {},
      "kernelRootkit": {},
      "kubernetes": {},
      "mitreAttack": {
        "version": "9"
      },
      "mute": "UNDEFINED",
      "name": "organizations/ORGANIZATION_ID/sources/SOURCE_ID/findings/FINDING_ID",
      "parent": "organizations/ORGANIZATION_ID/sources/SOURCE_ID",
      "parentDisplayName": "Virtual Machine Threat Detection",
      "processes": [],
      "resourceName": "//compute.googleapis.com/projects/PROJECT_ID/zones/ZONE/instances/INSTANCE_ID",
      "severity": "HIGH",
      "sourceDisplayName": "Virtual Machine Threat Detection",
      "state": "ACTIVE",
      "vulnerability": {},
      "workflowState": "NEW"
    },
    "resource": {
      "name": "//compute.googleapis.com/projects/PROJECT_ID/zones/ZONE/instances/INSTANCE_ID",
      "display_name": "DISPLAY_NAME",
      "project_name": "//cloudresourcemanager.googleapis.com/projects/PROJECT_NUMBER",
      "project_display_name": "PROJECT_ID",
      "parent_name": "//cloudresourcemanager.googleapis.com/projects/PROJECT_NUMBER",
      "parent_display_name": "DISPLAY_NAME",
      "type": "google.compute.Instance",
      "folders": []
    },
    "sourceProperties": {}
  }
      

Execution: Cryptocurrency Mining Combined Detection

這個輸出範例顯示 CRYPTOMINING_HASHCRYPTOMINING_YARA 模組偵測到的威脅。

{
  "findings": {
    "access": {},
    "assetDisplayName": "DISPLAY_NAME",
    "assetId": "organizations/ORGANIZATION_ID/assets/ASSET_ID",
    "canonicalName": "projects/PROJECT_ID/sources/SOURCE_ID/findings/FINDING_ID",
    "category": "Execution: Cryptocurrency Mining Combined Detection",
    "createTime": "2023-01-05T01:40:48.994Z",
    "database": {},
    "eventTime": "2023-01-05T01:39:36.876Z",
    "exfiltration": {},
    "findingClass": "THREAT",
    "findingProviderId": "organizations/ORGANIZATION_ID/firstPartyFindingProviders/vmtd",
    "indicator": {
      "signatures": [
        {
          "yaraRuleSignature": {
            "yaraRule": "YARA_RULE1"
          }
        },
        {
          "yaraRuleSignature": {
            "yaraRule": "YARA_RULE9"
          }
        },
        {
          "yaraRuleSignature": {
            "yaraRule": "YARA_RULE10"
          }
        },
        {
          "yaraRuleSignature": {
            "yaraRule": "YARA_RULE25"
          }
        },
        {
          "memoryHashSignature": {
            "binaryFamily": "XMRig",
            "detections": [
              {
                "binary": "linux-x86-64_xmrig_6.12.2",
                "percentPagesMatched": 1
              }
            ]
          }
        }
      ]
    },
    "kernelRootkit": {},
    "kubernetes": {},
    "mitreAttack": {
      "version": "9"
    },
    "mute": "UNDEFINED",
    "name": "organizations/ORGANIZATION_ID/sources/SOURCE_ID/findings/FINDING_ID",
    "parent": "organizations/ORGANIZATION_ID/sources/SOURCE_ID",
    "parentDisplayName": "Virtual Machine Threat Detection",
    "processes": [
      {
        "binary": {
          "path": "BINARY_PATH"
        },
        "script": {},
        "args": [
          "./miner",
          ""
        ],
        "pid": "123",
        "parentPid": "456",
        "name": "miner"
      }
    ],
    "resourceName": "//compute.googleapis.com/projects/PROJECT_ID/zones/ZONE/instances/INSTANCE_ID",
    "severity": "HIGH",
    "sourceDisplayName": "Virtual Machine Threat Detection",
    "state": "ACTIVE",
    "vulnerability": {},
    "workflowState": "NEW"
  },
  "resource": {
    "name": "//compute.googleapis.com/projects/PROJECT_ID/zones/ZONE/instances/INSTANCE_ID",
    "display_name": "DISPLAY_NAME",
    "project_name": "//cloudresourcemanager.googleapis.com/projects/PROJECT_ID",
    "project_display_name": "DISPLAY_NAME",
    "parent_name": "//cloudresourcemanager.googleapis.com/projects/PROJECT_ID",
    "parent_display_name": "DISPLAY_NAME",
    "type": "google.compute.Instance",
    "folders": []
  },
  "sourceProperties": {}
}
    

Execution: Cryptocurrency Mining Hash Match Detection

{
  "findings": {
    "access": {},
    "assetDisplayName": "DISPLAY_NAME",
    "assetId": "organizations/ORGANIZATION_ID/assets/ASSET_ID",
    "canonicalName": "projects/PROJECT_ID/sources/SOURCE_ID/findings/FINDING_ID",
    "category": "Execution: Cryptocurrency Mining Hash Match",
    "createTime": "2023-01-05T01:40:48.994Z",
    "database": {},
    "eventTime": "2023-01-05T01:39:36.876Z",
    "exfiltration": {},
    "findingClass": "THREAT",
    "findingProviderId": "organizations/ORGANIZATION_ID/firstPartyFindingProviders/vmtd",
    "indicator": {
      "signatures": [
        {
          "memoryHashSignature": {
            "binaryFamily": "XMRig",
            "detections": [
              {
                "binary": "linux-x86-64_xmrig_6.12.2",
                "percentPagesMatched": 1
              }
            ]
          }
        }
      ]
    },
    "kernelRootkit": {},
    "kubernetes": {},
    "mitreAttack": {
      "version": "9"
    },
    "mute": "UNDEFINED",
    "name": "organizations/ORGANIZATION_ID/sources/SOURCE_ID/findings/FINDING_ID",
    "parent": "organizations/ORGANIZATION_ID/sources/SOURCE_ID",
    "parentDisplayName": "Virtual Machine Threat Detection",
    "processes": [
      {
        "binary": {
          "path": "BINARY_PATH"
        },
        "script": {},
        "args": [
          "./miner",
          ""
        ],
        "pid": "123",
        "parentPid": "456",
        "name": "miner"
      }
    ],
    "resourceName": "//compute.googleapis.com/projects/PROJECT_ID/zones/ZONE/instances/INSTANCE_ID",
    "severity": "HIGH",
    "sourceDisplayName": "Virtual Machine Threat Detection",
    "state": "ACTIVE",
    "vulnerability": {},
    "workflowState": "NEW"
  },
  "resource": {
    "name": "//compute.googleapis.com/projects/PROJECT_ID/zones/ZONE/instances/INSTANCE_ID",
    "display_name": "DISPLAY_NAME",
    "project_name": "//cloudresourcemanager.googleapis.com/projects/PROJECT_ID",
    "project_display_name": "DISPLAY_NAME",
    "parent_name": "//cloudresourcemanager.googleapis.com/projects/PROJECT_ID",
    "parent_display_name": "DISPLAY_NAME",
    "type": "google.compute.Instance",
    "folders": []
  },
  "sourceProperties": {}
}
    

Execution: Cryptocurrency Mining YARA Rule

{
  "findings": {
    "access": {},
    "assetDisplayName": "DISPLAY_NAME",
    "assetId": "organizations/ORGANIZATION_ID/assets/ASSET_ID",
    "canonicalName": "projects/PROJECT_ID/sources/SOURCE_ID/findings/FINDING_ID",
    "category": "Execution: Cryptocurrency Mining YARA Rule",
    "createTime": "2023-01-05T00:37:38.450Z",
    "database": {},
    "eventTime": "2023-01-05T01:12:48.828Z",
    "exfiltration": {},
    "findingClass": "THREAT",
    "findingProviderId": "organizations/ORGANIZATION_ID/firstPartyFindingProviders/vmtd",
    "indicator": {
      "signatures": [
        {
          "yaraRuleSignature": {
            "yaraRule": "YARA_RULE9"
          }
        },
        {
          "yaraRuleSignature": {
            "yaraRule": "YARA_RULE10"
          }
        },
        {
          "yaraRuleSignature": {
            "yaraRule": "YARA_RULE25"
          }
        }
      ]
    },
    "kernelRootkit": {},
    "kubernetes": {},
    "mitreAttack": {
      "version": "9"
    },
    "mute": "UNDEFINED",
    "name": "organizations/ORGANIZATION_ID/sources/SOURCE_ID/findings/FINDING_ID",
    "parent": "organizations/ORGANIZATION_ID/sources/SOURCE_ID",
    "parentDisplayName": "Virtual Machine Threat Detection",
    "processes": [
      {
        "binary": {
          "path": "BINARY_PATH"
        },
        "script": {},
        "args": [
          "./miner",
          ""
        ],
        "pid": "123",
        "parentPid": "456",
        "name": "miner"
      }
    ],
    "resourceName": "//compute.googleapis.com/projects/PROJECT_ID/zones/ZONE/instances/INSTANCE_ID",
    "severity": "HIGH",
    "sourceDisplayName": "Virtual Machine Threat Detection",
    "state": "ACTIVE",
    "vulnerability": {},
    "workflowState": "NEW"
  },
  "resource": {
    "name": "//compute.googleapis.com/projects/PROJECT_ID/zones/ZONE/instances/INSTANCE_ID",
    "display_name": "DISPLAY_NAME",
    "project_name": "//cloudresourcemanager.googleapis.com/projects/PROJECT_ID",
    "project_display_name": "DISPLAY_NAME",
    "parent_name": "//cloudresourcemanager.googleapis.com/projects/PROJECT_ID",
    "parent_display_name": "DISPLAY_NAME",
    "type": "google.compute.Instance",
    "folders": []
  },
  "sourceProperties": {}
}
    

Malware: Malicious file on disk (YARA)

{
  "findings": {
    "assetDisplayName": "DISPLAY_NAME",
    "assetId": "organizations/ORGANIZATION_ID/assets/ASSET_ID",
    "canonicalName": "projects/PROJECT_ID/sources/SOURCE_ID/findings/FINDING_ID",
    "category": "Malware: Malicious file on disk (YARA)",
    "createTime": "2023-01-05T00:37:38.450Z",
    "eventTime": "2023-01-05T01:12:48.828Z",
    "findingClass": "THREAT",
    "findingProviderId": "organizations/ORGANIZATION_ID/firstPartyFindingProviders/vmtd",
    "indicator": {
      "signatures": [
        {
          "yaraRuleSignature": {
            "yaraRule": "M_Backdoor_REDSONJA_4"
          },
          "signatureType": "SIGNATURE_TYPE_FILE",
        },
        {
          "yaraRuleSignature": {
            "yaraRule": "M_Backdoor_REDSONJA_3"
          },
          "signatureType": "SIGNATURE_TYPE_FILE",
        }
      ]
    },
    "mute": "UNDEFINED",
    "name": "organizations/ORGANIZATION_ID/sources/SOURCE_ID/findings/FINDING_ID",
    "parent": "organizations/ORGANIZATION_ID/sources/SOURCE_ID",
    "parentDisplayName": "Virtual Machine Threat Detection",
    "files": [
      {
        "diskPath": {
          "partition_uuid": "b411dc99-f0a0-4c87-9e05-184977be8539",
          "relative_path": "RELATIVE_PATH"
        },
        "size": "21238",
        "sha256": "65d860160bdc9b98abf72407e14ca40b609417de7939897d3b58d55787aaef69",
        "hashedSize": "21238"
      }
    ],
    "resourceName": "//compute.googleapis.com/projects/PROJECT_ID/zones/ZONE/instances/INSTANCE_ID",
    "severity": "HIGH",
    "sourceDisplayName": "Virtual Machine Threat Detection",
    "state": "ACTIVE",
    "vulnerability": {},
    "workflowState": "NEW"
  },
  "resource": {
    "name": "//compute.googleapis.com/projects/PROJECT_ID/zones/ZONE/instances/INSTANCE_ID",
    "display_name": "DISPLAY_NAME",
    "project_name": "//cloudresourcemanager.googleapis.com/projects/PROJECT_ID",
    "project_display_name": "DISPLAY_NAME",
    "parent_name": "//cloudresourcemanager.googleapis.com/projects/PROJECT_ID",
    "parent_display_name": "DISPLAY_NAME",
    "type": "google.compute.Instance",
    "folders": []
  },
  "sourceProperties": {}
}
    

變更發現項目的狀態

解決 VM 威脅偵測服務識別出的威脅後,服務不會在後續掃描中自動將發現項目的狀態設為「Inactive」(不活躍)。由於威脅網域的性質,VM 威脅偵測無法判斷威脅是否已緩解,或是否已變更以避免偵測。

安全團隊確認威脅已減輕後,可以執行下列步驟,將調查結果的狀態變更為「非使用中」。

  1. 在 Google Cloud 控制台中,前往 Security Command Center 的「發現項目」頁面。

    前往「發現項目」

  2. 按一下「查看依據」旁的「來源類型」

  3. 在「來源類型」清單中,選取「虛擬機器威脅偵測」。 系統會根據所選來源類型,在表格中填入發現項目。

  4. 找出已解決的調查結果,然後勾選旁邊的核取方塊。

  5. 按一下「變更有效狀態」

  6. 按一下「未啟用」

為 Google Cloud啟用或停用 VM 威脅偵測

本節說明如何為 Compute Engine VM 啟用或停用 VM Threat Detection。如要為 AWS VM 啟用 VM 威脅偵測,請改為參閱「為 AWS 啟用 VM 威脅偵測」。

2022 年 7 月 15 日這項服務正式發布後,凡是註冊使用 Security Command Center Premium 的客戶,系統都會預設啟用 VM 威脅偵測功能。如有需要,您可以為專案或機構手動停用或重新啟用這項功能。

在機構或專案中啟用 VM 威脅偵測後,這項服務會自動掃描該機構或專案中的所有支援資源。反之,如果停用機構或專案的 VM 威脅偵測功能,服務就會停止掃描其中的所有支援資源。

如要啟用或停用 VM 威脅偵測,請按照下列步驟操作:

控制台

  1. 前往 Google Cloud 控制台的「Virtual Machine Threat Detection Service Enablement」(虛擬機器威脅偵測服務啟用) 頁面。

    前往「服務啟用」

  2. 選取您的機構或專案。

  3. 在「Service Enablement」(啟用服務) 分頁的「Virtual Machine Threat Detection」(虛擬機器威脅偵測) 欄中,選取要修改的機構、資料夾或專案啟用狀態,然後選取下列其中一個選項:

    • 啟用:啟用 VM 威脅偵測
    • 停用:停用 VM 威脅偵測
    • 沿用:沿用上層資料夾或機構的啟用狀態;僅適用於專案和資料夾

gcloud

gcloud scc manage services update 指令會更新 Security Command Center 服務或模組的狀態。

使用下方的任何指令資料之前,請先替換以下項目:

  • RESOURCE_TYPE:要更新的資源類型 (organizationfolderproject)
  • RESOURCE_ID:要更新的機構、資料夾或專案的數值 ID;如果是專案,您也可以使用英數字元的專案 ID
  • NEW_STATEENABLED 啟用 VM 威脅偵測; DISABLED 停用 VM 威脅偵測;或 INHERITED 沿用父項資源的啟用狀態 (僅適用於專案和資料夾)

執行 gcloud scc manage services update 指令:

Linux、macOS 或 Cloud Shell

gcloud scc manage services update vm-threat-detection \
    --RESOURCE_TYPE=RESOURCE_ID \
    --enablement-state=NEW_STATE

Windows (PowerShell)

gcloud scc manage services update vm-threat-detection `
    --RESOURCE_TYPE=RESOURCE_ID `
    --enablement-state=NEW_STATE

Windows (cmd.exe)

gcloud scc manage services update vm-threat-detection ^
    --RESOURCE_TYPE=RESOURCE_ID ^
    --enablement-state=NEW_STATE

您應該會收到類似以下的回應:

effectiveEnablementState: ENABLED
modules:
  CRYPTOMINING_HASH:
    effectiveEnablementState: ENABLED
    intendedEnablementState: ENABLED
  CRYPTOMINING_YARA:
    effectiveEnablementState: ENABLED
  KERNEL_INTEGRITY_TAMPERING:
    effectiveEnablementState: ENABLED
  KERNEL_MEMORY_TAMPERING:
    effectiveEnablementState: ENABLED
  MALWARE_DISK_SCAN_YARA:
    effectiveEnablementState: ENABLED
name: projects/1234567890123/locations/global/securityCenterServices/vm-threat-detection
updateTime: '2024-08-05T22:32:01.536452397Z'

REST

Security Command Center Management API 的 RESOURCE_TYPE.locations.securityCenterServices.patch 方法會更新 Security Command Center 服務或模組的狀態。

使用任何要求資料之前,請先替換以下項目:

  • RESOURCE_TYPE:要更新的資源類型 (organizationsfoldersprojects)
  • QUOTA_PROJECT:用於帳單和配額追蹤的專案 ID
  • RESOURCE_ID:要更新的機構、資料夾或專案的數值 ID;如果是專案,您也可以使用英數字元的專案 ID
  • NEW_STATEENABLED 啟用 VM 威脅偵測; DISABLED 停用 VM 威脅偵測;或 INHERITED 沿用父項資源的啟用狀態 (僅適用於專案和資料夾)

HTTP 方法和網址:

PATCH https://securitycentermanagement.googleapis.com/v1/RESOURCE_TYPE/RESOURCE_ID/locations/global/securityCenterServices/vm-threat-detection?updateMask=intendedEnablementState

JSON 要求主體:

{
  "intendedEnablementState": "NEW_STATE"
}

如要傳送要求,請展開以下其中一個選項:

您應該會收到如下的 JSON 回應:

{
  "name": "projects/1234567890123/locations/global/securityCenterServices/vm-threat-detection",
  "effectiveEnablementState": "ENABLED",
  "modules": {
    "CRYPTOMINING_YARA": {
      "effectiveEnablementState": "ENABLED"
    },
    "KERNEL_MEMORY_TAMPERING": {
      "effectiveEnablementState": "ENABLED"
    },
    "KERNEL_INTEGRITY_TAMPERING": {
      "effectiveEnablementState": "ENABLED"
    },
    "CRYPTOMINING_HASH": {
      "intendedEnablementState": "ENABLED",
      "effectiveEnablementState": "ENABLED"
    },
    "MALWARE_DISK_SCAN_YARA": {
      "effectiveEnablementState": "ENABLED"
    }
  },
  "updateTime": "2024-08-05T22:32:01.536452397Z"
}

啟用或停用 VM 威脅偵測模組

如要啟用或停用個別 VM 威脅偵測偵測器 (又稱模組),請按照下列步驟操作。您所做的變更最多可能需要 1 小時才會生效。

如要瞭解所有 VM Threat Detection 威脅調查結果和產生這些結果的模組,請參閱「威脅調查結果」。

控制台

您可以在 Google Cloud 控制台中啟用或停用機構層級的 VM 威脅偵測模組。如要在資料夾或專案層級啟用或停用 VM 威脅偵測模組,請使用 gcloud CLI 或 REST API。

  1. 前往 Google Cloud 控制台的「Virtual Machine Threat Detection Modules」(虛擬機器威脅偵測模組) 頁面。

    前往「Modules」(模組)

  2. 按一下要啟用或停用模組的雲端服務供應商分頁標籤,例如「Google Cloud」

  3. 在「模組」分頁的「狀態」欄中,選取要啟用或停用模組的目前狀態,然後選取下列其中一個選項:

    • 啟用:啟用模組。
    • 停用:停用模組。

gcloud

gcloud scc manage services update 指令會更新 Security Command Center 服務或模組的狀態。

使用下方的任何指令資料之前,請先替換以下項目:

  • RESOURCE_TYPE:要更新的資源類型 (organizationfolderproject)
  • RESOURCE_ID:要更新的機構、資料夾或專案的數值 ID;如果是專案,您也可以使用英數字元的專案 ID
  • MODULE_NAME:要啟用或停用的模組名稱;如需有效值,請參閱「威脅發現
  • NEW_STATEENABLED 啟用模組;DISABLED 停用模組;或 INHERITED 沿用父項資源的啟用狀態 (僅適用於專案和資料夾)

將下列內容儲存到名為 request.json 的檔案:

{
  "MODULE_NAME": {
    "intendedEnablementState": "NEW_STATE"
  }
}

執行 gcloud scc manage services update 指令:

Linux、macOS 或 Cloud Shell

gcloud scc manage services update vm-threat-detection \
    --RESOURCE_TYPE=RESOURCE_ID \
    --enablement-state=ENABLED \  
    --module-config-file=request.json

Windows (PowerShell)

gcloud scc manage services update vm-threat-detection `
    --RESOURCE_TYPE=RESOURCE_ID `
    --enablement-state=ENABLED \  
    --module-config-file=request.json

Windows (cmd.exe)

gcloud scc manage services update vm-threat-detection ^
    --RESOURCE_TYPE=RESOURCE_ID ^
    --enablement-state=ENABLED \  
    --module-config-file=request.json

您應該會收到類似以下的回應:

effectiveEnablementState: ENABLED
modules:
  CRYPTOMINING_HASH:
    effectiveEnablementState: ENABLED
    intendedEnablementState: ENABLED
  CRYPTOMINING_YARA:
    effectiveEnablementState: ENABLED
  KERNEL_INTEGRITY_TAMPERING:
    effectiveEnablementState: ENABLED
  KERNEL_MEMORY_TAMPERING:
    effectiveEnablementState: ENABLED
  MALWARE_DISK_SCAN_YARA:
    effectiveEnablementState: ENABLED
name: projects/1234567890123/locations/global/securityCenterServices/vm-threat-detection
updateTime: '2024-08-05T22:32:01.536452397Z'

REST

Security Command Center Management API 的 RESOURCE_TYPE.locations.securityCenterServices.patch 方法會更新 Security Command Center 服務或模組的狀態。

使用任何要求資料之前,請先替換以下項目:

  • RESOURCE_TYPE:要更新的資源類型 (organizationsfoldersprojects)
  • QUOTA_PROJECT:用於帳單和配額追蹤的專案 ID
  • RESOURCE_ID:要更新的機構、資料夾或專案的數值 ID;如果是專案,您也可以使用英數字元的專案 ID
  • MODULE_NAME:要啟用或停用的模組名稱;如需有效值,請參閱「威脅發現
  • NEW_STATEENABLED 啟用模組;DISABLED 停用模組;或 INHERITED 沿用父項資源的啟用狀態 (僅適用於專案和資料夾)

HTTP 方法和網址:

PATCH https://securitycentermanagement.googleapis.com/v1/RESOURCE_TYPE/RESOURCE_ID/locations/global/securityCenterServices/vm-threat-detection?updateMask=modules

JSON 要求主體:

{
  "modules": {
    "MODULE_NAME": {
      "intendedEnablementState": "NEW_STATE"
    }
  }
}

如要傳送要求,請展開以下其中一個選項:

您應該會收到如下的 JSON 回應:

{
  "name": "projects/1234567890123/locations/global/securityCenterServices/vm-threat-detection",
  "effectiveEnablementState": "ENABLED",
  "modules": {
    "CRYPTOMINING_YARA": {
      "effectiveEnablementState": "ENABLED"
    },
    "KERNEL_MEMORY_TAMPERING": {
      "effectiveEnablementState": "ENABLED"
    },
    "KERNEL_INTEGRITY_TAMPERING": {
      "effectiveEnablementState": "ENABLED"
    },
    "CRYPTOMINING_HASH": {
      "intendedEnablementState": "ENABLED",
      "effectiveEnablementState": "ENABLED"
    },
    "MALWARE_DISK_SCAN_YARA": {
      "effectiveEnablementState": "ENABLED"
    }
  },
  "updateTime": "2024-08-05T22:32:01.536452397Z"
}

查看 VM 威脅偵測模組的設定

如要瞭解所有 VM Threat Detection 威脅調查結果和產生這些結果的模組,請參閱「威脅調查結果」表格。

控制台

您可以在 Google Cloud 控制台中,查看機構層級的 VM 威脅偵測模組設定。如要在資料夾或專案層級查看 VM 威脅偵測模組的設定,請使用 gcloud CLI 或 REST API。

如要在 Google Cloud 控制台中查看設定,請前往「Virtual Machine Threat Detection Modules」(虛擬機器威脅偵測模組) 頁面。

前往「Modules」(模組)

gcloud

gcloud scc manage services describe 指令會取得 Security Command Center 服務或模組的狀態。

使用下方的任何指令資料之前,請先替換以下項目:

  • RESOURCE_TYPE:要取得的資源類型 (organizationfolderproject)
  • RESOURCE_ID:要取得的機構、資料夾或專案的數值 ID;如果是專案,您也可以使用英數字元的專案 ID

執行 gcloud scc manage services describe 指令:

Linux、macOS 或 Cloud Shell

gcloud scc manage services describe vm-threat-detection \
    --RESOURCE_TYPE=RESOURCE_ID

Windows (PowerShell)

gcloud scc manage services describe vm-threat-detection `
    --RESOURCE_TYPE=RESOURCE_ID

Windows (cmd.exe)

gcloud scc manage services describe vm-threat-detection ^
    --RESOURCE_TYPE=RESOURCE_ID

您應該會收到類似以下的回應:

effectiveEnablementState: ENABLED
modules:
  CRYPTOMINING_HASH:
    effectiveEnablementState: ENABLED
    intendedEnablementState: ENABLED
  CRYPTOMINING_YARA:
    effectiveEnablementState: ENABLED
  KERNEL_INTEGRITY_TAMPERING:
    effectiveEnablementState: ENABLED
  KERNEL_MEMORY_TAMPERING:
    effectiveEnablementState: ENABLED
  MALWARE_DISK_SCAN_YARA:
    effectiveEnablementState: ENABLED
name: projects/1234567890123/locations/global/securityCenterServices/vm-threat-detection
updateTime: '2024-08-05T22:32:01.536452397Z'

REST

Security Command Center Management API 的 RESOURCE_TYPE.locations.securityCenterServices.get 方法會取得 Security Command Center 服務或模組的狀態。

使用任何要求資料之前,請先替換以下項目:

  • RESOURCE_TYPE:要取得的資源類型 (organizationsfoldersprojects)
  • QUOTA_PROJECT:用於帳單和配額追蹤的專案 ID
  • RESOURCE_ID:要取得的機構、資料夾或專案的數值 ID;如果是專案,您也可以使用英數字元的專案 ID

HTTP 方法和網址:

GET https://securitycentermanagement.googleapis.com/v1/RESOURCE_TYPE/RESOURCE_ID/locations/global/securityCenterServices/vm-threat-detection

如要傳送要求,請展開以下其中一個選項:

您應該會收到如下的 JSON 回應:

{
  "name": "projects/1234567890123/locations/global/securityCenterServices/vm-threat-detection",
  "effectiveEnablementState": "ENABLED",
  "modules": {
    "CRYPTOMINING_YARA": {
      "effectiveEnablementState": "ENABLED"
    },
    "KERNEL_MEMORY_TAMPERING": {
      "effectiveEnablementState": "ENABLED"
    },
    "KERNEL_INTEGRITY_TAMPERING": {
      "effectiveEnablementState": "ENABLED"
    },
    "CRYPTOMINING_HASH": {
      "intendedEnablementState": "ENABLED",
      "effectiveEnablementState": "ENABLED"
    },
    "MALWARE_DISK_SCAN_YARA": {
      "effectiveEnablementState": "ENABLED"
    }
  },
  "updateTime": "2024-08-05T22:32:01.536452397Z"
}

用於偵測加密貨幣挖礦的軟體名稱和 YARA 規則

以下列出會觸發加密貨幣挖礦發現的二進位檔和 YARA 規則名稱。如要查看清單,請展開節點。

Execution: Cryptocurrency Mining Hash Match

  • Arionum CPU 礦工:適用於 Arionum 加密貨幣的挖礦軟體
  • Avermore:適用於以 Scrypt 為基礎的加密貨幣的挖礦軟體
  • Beam CUDA 礦工:適用於以 Equihash 為基礎的加密貨幣的挖礦軟體
  • Beam OpenCL 礦工:適用於以 Equihash 為基礎的加密貨幣的挖礦軟體
  • BFGMiner:以 ASIC/FPGA 為基礎的比特幣挖礦軟體
  • BMiner:適用於各種加密貨幣的挖礦軟體
  • Cast XMR:適用於以 CryptoNight 為基礎的加密貨幣的挖礦軟體 CryptoNight
  • ccminer:以 CUDA 為基礎的挖礦軟體
  • cgminer:以 ASIC/FPGA 為基礎的比特幣挖礦軟體
  • Claymore 的礦工:以 GPU 為基礎的挖礦軟體,適用於各種加密貨幣
  • CPUMiner:以 CPU 為基礎的挖礦軟體系列
  • CryptoDredge:挖礦軟體系列,適用於 CryptoDredge
  • CryptoGoblin:適用於以 CryptoNight 為基礎的加密貨幣的挖礦軟體 CryptoNight
  • DamoMiner:以 GPU 為基礎的挖礦軟體,適用於Ethereum和其他加密貨幣
  • DigitsMiner:Digits 挖礦軟體
  • EasyMiner:比特幣和其他加密貨幣的挖礦軟體
  • Ethminer:適用於Ethereum和其他加密貨幣的挖礦軟體
  • EWBF:適用於以 Equihash 為基礎的加密貨幣的挖礦軟體
  • FinMiner:適用於 Ethash 和 CryptoNight 的挖礦軟體 加密貨幣
  • Funakoshi Miner:適用於 Bitcoin-Gold 加密貨幣的挖礦軟體
  • GethEthereum的挖礦軟體
  • GMiner:適用於各種加密貨幣的挖礦軟體
  • gominer:適用於 Decred
  • GrinGoldMiner:用於挖掘 Grin 的挖礦軟體
  • Hush:以 Zcash 為基礎的加密貨幣挖礦軟體
  • IxiMiner:適用於 Ixian 的挖礦軟體
  • kawpowminer:適用於 Ravencoin 的挖礦軟體
  • Komodo:Komodo 挖礦軟體系列
  • lolMiner:適用於各種加密貨幣的挖礦軟體
  • lukMiner:適用於各種加密貨幣的挖礦軟體
  • MinerGate:適用於各種加密貨幣的挖礦軟體
  • miniZ:適用於以 Equihash 為基礎的加密貨幣挖礦軟體
  • Mirai:可用於挖礦的惡意軟體
  • MultiMiner:適用於各種加密貨幣的挖礦軟體
  • nanominer:適用於各種加密貨幣的挖礦軟體
  • NBMiner:適用於各種加密貨幣的挖礦軟體
  • Nevermore:適用於各種加密貨幣的挖礦軟體
  • nheqminer:適用於 NiceHash 的挖礦軟體
  • NinjaRig:適用於 Argon2 型加密貨幣的挖礦軟體
  • NodeCore PoW CUDA Miner:適用於 VeriBlock 的挖礦軟體
  • NoncerProNimiq 挖礦軟體
  • Optiminer/Equihash:適用於以 Equihash 為基礎的加密貨幣挖礦軟體
  • PascalCoin:PascalCoin 挖礦軟體系列
  • PhoenixMiner:用於Ethereum的挖礦軟體
  • Pooler CPU MinerLitecoin和比特幣的挖礦軟體
  • ProgPoW Miner:適用於Ethereum和其他加密貨幣的挖礦軟體
  • rhminer:適用於 PascalCoin 的挖礦軟體
  • sgminer:以 Scrypt 為基礎的加密貨幣挖礦軟體
  • simplecoin:適用於以 scrypt 為基礎的 SimpleCoin 的挖礦軟體系列
  • Skypool Nimiq Miner:適用於 Nimiq 的挖礦軟體
  • SwapReferenceMiner:適用於 Grin 的挖礦軟體
  • Team Red Miner:適用於各種加密貨幣的 AMD 挖礦軟體
  • T-Rex:適用於各種加密貨幣的挖礦軟體
  • TT-Miner:適用於各種加密貨幣的挖礦軟體
  • Ubqminer:適用於 Ubqhash 型加密貨幣的挖礦軟體
  • VersusCoin:VersusCoin 的挖礦軟體
  • violetminer:適用於 Argon2 型加密貨幣的挖礦軟體
  • webchain-miner:適用於 MintMe 的挖礦軟體
  • WildRig:適用於各種加密貨幣的挖礦軟體
  • XCASH_ALL_Miner:適用於 XCASH 的挖礦軟體
  • xFash:MinerGate 挖礦軟體
  • XLArig:適用於以 CryptoNight 為基礎的 加密貨幣挖礦軟體
  • XMRig:適用於各種加密貨幣的挖礦軟體
  • Xmr-Stak:適用於以 CryptoNight 為基礎的加密貨幣挖礦軟體 CryptoNight
  • XMR-Stak TurtleCoin:適用於以 CryptoNight 為基礎的加密貨幣的挖礦軟體 CryptoNight
  • Xtl-Stak:以 CryptoNight 為基礎的加密貨幣挖礦軟體
  • Yam Miner:MinerGate 挖礦軟體
  • YCash:YCash 挖礦軟體
  • ZCoin:ZCoin/Fire 的挖礦軟體
  • Zealot/Enemy:適用於各種加密貨幣的挖礦軟體
  • 加密貨幣挖礦程式訊號1

1 這個一般威脅名稱表示 VM 中可能正在執行不明加密貨幣挖礦程式,但 VM 威脅偵測功能沒有該挖礦程式的具體資訊。

Execution: Cryptocurrency Mining YARA Rule

  • YARA_RULE1:比對 Monero 的挖礦軟體
  • YARA_RULE9:比對使用 Blake2 和 AES 密碼的挖礦軟體
  • YARA_RULE10:比對使用 CryptoNight 工作量證明的挖礦軟體
  • YARA_RULE15:比對出 NBMiner 挖礦軟體NBMiner
  • YARA_RULE17:比對使用 Scrypt 工作量證明常式的挖礦軟體
  • YARA_RULE18:比對使用 Scrypt 工作量證明的挖礦軟體
  • YARA_RULE19:比對 BFGMiner 的挖礦軟體BFGMiner
  • YARA_RULE24:比對 XMR-Stak 的挖礦軟體
  • YARA_RULE25:比對出適用於 XMRig 的挖礦軟體
  • DYNAMIC_YARA_RULE_BFGMINER_2:比對 BFGMiner 的挖礦軟體

後續步驟