HackTool - Sliver C2 Implant Activity Pattern
Detects process activity patterns as seen being used by Sliver C2 framework implants
Sigma rule (View on GitHub)
1title: HackTool - Sliver C2 Implant Activity Pattern
2id: 42333b2c-b425-441c-b70e-99404a17170f
3status: test
4description: Detects process activity patterns as seen being used by Sliver C2 framework implants
5references:
6 - https://github.com/BishopFox/sliver/blob/79f2d48fcdfc2bee4713b78d431ea4b27f733f30/implant/sliver/shell/shell_windows.go#L36
7 - https://www.microsoft.com/security/blog/2022/08/24/looking-for-the-sliver-lining-hunting-for-emerging-command-and-control-frameworks/
8author: Nasreddine Bencherchali (Nextron Systems), Florian Roth (Nextron Systems)
9date: 2022-08-25
10modified: 2023-03-05
11tags:
12 - attack.execution
13 - attack.t1059
14logsource:
15 category: process_creation
16 product: windows
17detection:
18 selection:
19 CommandLine|contains: '-NoExit -Command [Console]::OutputEncoding=[Text.UTF8Encoding]::UTF8'
20 condition: selection
21falsepositives:
22 - Unlikely
23level: critical
References
Related rules
- Abusable DLL Potential Sideloading From Suspicious Location
- Add Insecure Download Source To Winget
- Add New Download Source To Winget
- Atlassian Confluence CVE-2022-26134
- Azure New CloudShell Created