← Back to SOC feed Coverage →

Rclone Config File Creation

sigma MEDIUM SigmaHQ
T1567.002
imFileEvent
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T03:05:59Z · Confidence: medium

Hunt Hypothesis

Adversaries may create Rclone config files to exfiltrate data or establish persistent access by leveraging cloud storage. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential data exfiltration or lateral movement tactics early.

Detection Rule

Sigma (Original)

title: Rclone Config File Creation
id: 34986307-b7f4-49be-92f3-e7a4d01ac5db
status: test
description: Detects Rclone config files being created
references:
    - https://research.nccgroup.com/2021/05/27/detecting-rclone-an-effective-tool-for-exfiltration/
author: Aaron Greetham (@beardofbinary) - NCC Group
date: 2021-05-26
modified: 2023-05-09
tags:
    - attack.exfiltration
    - attack.t1567.002
logsource:
    product: windows
    category: file_event
detection:
    selection:
        TargetFilename|contains|all:
            - ':\Users\'
            - '\.config\rclone\'
    condition: selection
falsepositives:
    - Legitimate Rclone usage
level: medium

KQL (Azure Sentinel)

imFileEvent
| where TargetFileName contains ":\\Users\\" and TargetFileName contains "\\.config\\rclone\\"

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/file/file_event/file_event_win_rclone_config_files.yml