Powershell drops NetSupport RAT client

Powershell drops NetSupport RAT client

Sigma rule (View on GitHub)

 1title: Powershell drops NetSupport RAT client
 2status: experimental
 3description: Powershell drops NetSupport RAT client
 4author: Joe Security
 5id: 200105
 6threatname: NetSupport RAT
 7behaviorgroup: 21
 8classification: 4
 9logsource:
10    service: sysmon
11    product: windows
12detection:
13    selection:
14        EventID: 11
15        Image: '*\powershell.exe*'
16        TargetFilename:
17            - '*\AppData\Roaming\\*\NSM.lic*'
18            
19    condition: selection
20level: critical
to-top