heroui logo

Malicious ShellIntel PowerShell Commandlets

Sigma Rules

View Source
Summary
This detection rule identifies the presence of specific PowerShell commandlets associated with ShellIntel exploitation scripts. It targets the commandlets 'Invoke-SMBAutoBrute', 'Invoke-GPOLinks', and 'Invoke-Potato'. These commandlets are likely linked to tactics employed by attackers to exploit Windows systems using PowerShell scripts. The detection requires Script Block Logging to be enabled on the monitored systems, effectively capturing the execution of these commandlets. The rule classifies the threat level as high due to the potential for significant security breaches if these commandlets are executed by unauthorized entities. This rule is implemented on Windows systems where PowerShell scripts may be used for malicious purposes. The reference link to the ShellIntel GitHub repository provides additional context on the exploitation methods related to these commandlets.
Categories
  • Endpoint
  • Windows
Data Sources
  • Script
  • Process
Created: 2021-08-09