Hide Navigation Hide TOC Leviathan Registry Key Activity (70d43542-cd2d-483c-8f30-f16b436fd7db) Detects registry key used by Leviathan APT in Malaysian focused campaign Cluster A Galaxy A Cluster B Galaxy B Level Registry Run Keys / Startup Folder - T1547.001 (9efb1ea7-c37b-4595-9640-b7680cd84279) Attack Pattern Leviathan Registry Key Activity (70d43542-cd2d-483c-8f30-f16b436fd7db) Sigma-Rules 1 Registry Run Keys / Startup Folder - T1547.001 (9efb1ea7-c37b-4595-9640-b7680cd84279) Attack Pattern Boot or Logon Autostart Execution - T1547 (1ecb2399-e8ba-4f6b-8ba7-5c27d49405cf) Attack Pattern 2