Files
blue-team-tools/rules/windows/powershell/powershell_script/posh_ps_psattack.yml
T

24 lines
600 B
YAML
Raw Normal View History

2019-11-12 23:12:27 +01:00
title: PowerShell PSAttack
id: b7ec41a4-042c-4f31-a5db-d0fcde9fa5c5
2022-12-27 12:29:10 +01:00
status: test
2017-03-05 01:47:25 +01:00
description: Detects the use of PSAttack PowerShell hack tool
references:
- https://adsecurity.org/?p=2921
2017-03-05 01:47:25 +01:00
author: Sean Metcalf (source), Florian Roth (rule)
date: 2017/03/05
2022-12-27 12:29:10 +01:00
modified: 2022/12/25
2022-10-26 09:43:39 +02:00
tags:
- attack.execution
- attack.t1059.001
2017-03-05 01:47:25 +01:00
logsource:
product: windows
2021-10-16 08:18:49 +02:00
category: ps_script
2023-01-04 17:49:32 +01:00
definition: 'Requirements: Script Block Logging must be enabled'
2017-03-05 01:47:25 +01:00
detection:
2017-10-18 21:49:38 +02:00
selection:
2021-08-21 09:33:52 +02:00
ScriptBlockText|contains: 'PS ATTACK!!!'
2021-08-21 10:05:47 +02:00
condition: selection
2017-03-05 01:47:25 +01:00
falsepositives:
- Unknown
2017-03-05 01:47:25 +01:00
level: high