
Summary
This detection rule identifies the usage of PSAsyncShell, which is an asynchronous TCP reverse shell implemented in PowerShell. The detection is crucial for security teams, as reverse shells can provide attackers with unauthorized remote access to compromised systems. The rule works by monitoring PowerShell script block logs for any execution of scripts that contain the term 'PSAsyncShell'. For the detection to work, it is essential that Script Block Logging is enabled on the Windows system. The high severity level indicates an urgent need for proactive investigation and response upon detection. Reference to the GitHub page offers additional insights and context on the PSAsyncShell tool for those analyzing alerts generated by this rule.
Categories
- Windows
- Endpoint
Data Sources
- Script
- Process
Created: 2022-10-04