
Summary
This detection rule identifies the execution of potentially malicious PowerShell commands that utilize Meterpreter modules, like 'MSF.Powershell' and 'MSF.Powershell.Meterpreter'. By employing PowerShell Script Block Logging, the rule inspects logs for specific command text indicative of post-exploitation actions such as credential theft or persistence operations by attackers after they have compromised a system. Such activities can lead to significant security breaches since attackers can maintain control over an environment, escalate privileges, and perform various malicious operations without detection. The rule is designed to alert security teams to these critical events, enabling timely responses to incidents.
Categories
- Endpoint
Data Sources
- Pod
- Process
ATT&CK Techniques
- T1059
- T1059.001
Created: 2024-11-13