Cobalt Strike Beacon Implant Command Issued via Named Pipe (RedCanary Threat Detection Report)

Detects named pipe creation indicating Cobalt Strike beacon implant issuing commands via SMB named pipe. Part of the RedCanary 2023 Threat Detection Report.

Sigma rule (View on GitHub)

 1title: Cobalt Strike Beacon Implant Command Issued via Named Pipe (RedCanary Threat Detection Report)
 2id: 0da8f33f-2703-4a4e-92f8-a6090a31b1e1
 3status: experimental
 4description: Detects named pipe creation indicating Cobalt Strike beacon implant issuing commands via SMB named pipe. Part of the RedCanary 2023 Threat Detection Report.
 5references:
 6    - https://redcanary.com/threat-detection-report/threats/cobalt-strike/
 7author: RedCanary, Sigma formatting by Micah Babinski
 8date: 2023/05/10
 9tags:
10    - attack.s0154
11logsource:
12    category: pipe_created
13    product: windows
14detection:
15    selection:
16        PipeName|startswith:
17            - '\msagent_'
18            - '\interprocess_'
19            - '\lsarpc_'
20            - '\samr_'
21            - '\netlogon_'
22            - '\wkssvc_'
23            - '\srvsvc_'
24            - '\mojo_'
25            - '\postex_'
26            - '\status_'
27            - '\msse-'
28    condition: selection
29falsepositives:
30    - Unknown
31level: low```

References

Related rules

to-top