Custom Cobalt Strike Command Execution

Detects the execution of a specific OneLiner to Invoke PowerShell commands.

Sigma rule (View on GitHub)

 1title: Custom Cobalt Strike Command Execution
 2id: 782de568-fadb-4e7f-b89a-64247a606830
 3status: experimental
 4description: Detects the execution of a specific OneLiner to Invoke PowerShell commands.
 5author: 'Kostastsale, TheDFIRReport'
 6references:
 7    - https://thedfirreport.com/2022/05/09/seo-poisoning-a-gootloader-story/
 8    - https://gist.github.com/mgeeky/3b11169ab77a7de354f4111aa2f0df38
 9date: 2022-05-09
10modified: 2024-02-23
11logsource:
12    product: windows
13    category: process_creation
14detection:
15    selection:
16        Image|endswith: '\powershell.exe'
17        CommandLine|contains|all:
18            - 'http://127.0.0.1'
19            - '%{(IRM $_)}'
20            - 'Invoke'
21    condition: selection
22falsepositives:
23    - Unknown
24level: high
25tags:
26    - attack.defense-evasion
27    - attack.t1562.001
28    - attack.execution
29    - attack.t1059.001
yaml

References

Related rules

to-top