Skip to content

Malwarebytes

Malwarebytes

About

Malwarebytes protects your home devices and your business endpoints against malware, ransomware, malicious websites, and other advanced online threats.

Malwarebytes is an anti-malware software for Microsoft Windows, macOS, Chrome OS, Android, and iOS that finds and removes malware. Made by Malwarebytes Corporation, it was first released in January 2006.

Product Details

Vendor URL: Malwarebytes Cybersecurity for Home and Business | Anti-Malware

Product Type: EDR

Product Tier: Tier I

Integration Method: Syslog

Integration URL: Configure the Management Console to connect to a Syslog

Log Guide: Malwarebytes Endpoint Security logs

Parser Details

Log Format: Syslog/CEF

Expected Normalization Rate: 75%-100%

Data Label: MALWAREBYTES_EDR

UDM Fields (list of all UDM fields leveraged in the Parser):

Log File Field UDM Field
vendor metadata.vendor_name
product metadata.product_name
version metadata.product_version
product_event metadata.product_event_type
Statically Defined metadata.event_type
msg metadata.description
src_domain principal.administrative_domain
deviceExternalId additional.fields
src, shost principal.hostname
src, shost principal.ip
dst, dhost target.hostname
dst, dhost target.ip
suser principal.user.userid
request target.url
observer observer.hostname
observer observer.ip
INFORMATIONAL, LOW, MEDIUM, HIGH, CRITICAL security_result.severity
SOFTWARE_SUSPICIOUS, SOFTWARE_MALICIOUS security_result.security_category
fileType additional.fields
mime_type target.file.mime_type
file_path target.file.full_path
cs1 security_result.threat_name
cat security_result.category_details
ALLOW, BLOCK, QUARANTINE security_result.action

Product Event Types

type,subtype severity UDM Event Classification alerting enabled
Default GENERIC_EVENT
PUP quarantined SCAN_HOST
Malware quarantined SCAN_HOST
Malware found SCAN_HOST Y
PUP found SCAN_HOST

Log Sample

2022-01-05T12:16:56Z hostname2 CEF:0|Malwarebytes|Malwarebytes Incident Response|Incident Response 1.2.0.689|Detection|Malware quarantined|1|deviceExternalId=extid dvchost=hostname2 deviceDnsDomain=domain.companyname dvcmac=devmac dvc=10.0.0.113 rt=Jan 04 2022 21:00:01 Z fileType=file cat=Malware act=quarantined msg=Malware quarantined\nFile: C:\\USERS\\1234567890\\DOWNLOADS\\file\nMD5: md5 filePath=C:\\USERS\\1234567890\\DOWNLOADS\\file cs1Label=Detection name cs1=RiskWare.FileServer

Sample Parsing

metadata.event_timestamp = "2022-01-04T21:00:01Z"
metadata.event_type = "SCAN_HOST"
metadata.vendor_name = "Malwarebytes"
metadata.product_name = "Malwarebytes Incident Response"
metadata.product_version = "Incident Response 1.2.0.689"
metadata.product_event_type = "Malware quarantined"
metadata.description = "Malware quarantined\nFile: C:\\USERS\\1234567890\\DOWNLOADS\\file\nMD5: md5"
metadata.ingested_timestamp = "2022-01-05T12:20:37.720248Z"
additional.device_external_id = "extid"
additional.file_type = "file"
principal.hostname = "hostname1"
principal.ip = "10.0.0.113"
principal.administrative_domain = "domain.companyname"
principal.asset.ip = "10.0.0.113"
src.file.full_path = "C:\\USERS\\1234567890\\DOWNLOADS\\file"
src.file.mime_type = "EXE"
observer.hostname = "hostname2"
security_result.category = "SOFTWARE_MALICIOUS"
security_result.category_details = "Malware"
security_result.threat_name = "RiskWare.FileServer"
security_result.action = "QUARANTINE"
security_result.severity = "HIGH"
security_result.alert_state = "ALERTING"

Parser Alerting

loglevel sec_result.severity security_action is_alert
Malware Found High Y

Rules

Coming Soon