2020-10-13 02:21:46 +02:00
title : Bad Opsec Powershell Code Artifacts
2021-10-09 09:50:49 +02:00
id : 8d31a8ce-46b5-4dd6-bdc3-680931f1db86
related :
- id : 73e733cc-1ace-3212-a107-ff2523cc9fc3
type : derived
2020-10-13 02:21:46 +02:00
description : Focuses on trivial artifacts observed in variants of prevalent offensive ps1 payloads, including Cobalt Strike Beacon, PoshC2, Powerview, Letmein, Empire, Powersploit, and other attack payloads that often undergo minimal changes by attackers due to bad opsec.
status : experimental
references :
- https://newtonpaul.com/analysing-fileless-malware-cobalt-strike-beacon/
- https://labs.sentinelone.com/top-tier-russian-organized-cybercrime-group-unveils-fileless-stealthy-powertrick-backdoor-for-high-value-targets/
- https://www.mdeditor.tw/pl/pgRt
author : 'ok @securonix invrep_de, oscd.community'
date : 2020 /10/09
2021-10-16 08:05:15 +02:00
modified : 2021 /10/16
2020-10-13 02:21:46 +02:00
tags :
- attack.execution
- attack.t1059.001
2021-08-22 13:57:56 +02:00
- attack.t1086 # an old one
2020-10-13 02:21:46 +02:00
logsource :
product : windows
2021-10-16 08:05:15 +02:00
category : ps_module
2021-10-09 16:42:42 +02:00
definition : PowerShell Module Logging must be enabled
2020-10-13 02:21:46 +02:00
detection :
2020-10-14 15:41:31 -04:00
selection_4103 :
2020-10-14 15:37:15 -04:00
Payload|contains :
2020-10-14 16:55:52 -04:00
- '$DoIt'
- 'harmj0y'
- 'mattifestation'
- '_RastaMouse'
- 'tifkin_'
- '0xdeadbeef'
2021-10-09 09:50:49 +02:00
condition : selection_4103
2020-10-13 02:21:46 +02:00
falsepositives :
- 'Moderate-to-low; Despite the shorter length/lower entropy for some of these, because of high specificity, fp appears to be fairly limited in many environments.'
2021-06-10 09:42:07 +02:00
level : critical